-
2361
Design and implementation of a novel general format multimedia digital rights management system
Published 2013-10-01“…Aiming at the copyright protection of multimedia content,a novel general format multimedia digital rights management model was designed which includes encryption and packaging of content,ke nagement,security engine,license management and distribution,DRM client,DRM management and other functional units.This model uses un-structured encryption method which overcomes the limit ions of encryption method based on the content format to sup-port the general format multimedia.In addition,this model uses the license acquisition number as the only certificate to download license to solve the problem of license reissue and transfer,and supports fine-grained control model.Combined with this model,a multimedia digital rights management system was developed based on fixed and mobile converged services which is used in the field of digital consumer.experimental results and practical application show that this scheme with good practice in the copyright protection multimedia content does not affect the multimedia quality,and have high efficiency and safety.…”
Get full text
Article -
2362
Network traffic anomaly detection method based on multi-scale characteristic
Published 2022-10-01“…Aiming at the problem that most of the traditional network traffic anomaly detection methods only pay attention to the fine-grained features of traffic data, and make insufficient use of multi-scale feature information, which may lead to low accuracy of anomaly detection results, a network traffic anomaly detection method based on multi-scale features was proposed.The original traffic was divided into sub-sequences with multiple observation spans by using multiple sliding windows of different scales, and the multi-level sequences of each sub-sequence were reconstructed by wavelet transform technology.Multi-level reconstructed sequences were generated by Chain SAE through feature space mapping, and a preliminary judgment of abnormality was made by the classifiers of each level according to the errors of the reconstructed sequences.The weighted voting strategy was adopted to summarize the preliminary judgment results of each level to form the final result judgment.Experimental results show that the proposed method can effectively mine the multi-scale feature information of network traffic, and the detection performance of abnormal traffic is obviously improved compared with traditional methods.…”
Get full text
Article -
2363
ZnO:Al Grown by Sputtering from Two Different Target Sources: A Comparison Study
Published 2012-01-01“…The microstructure, such as the grain size and the texture, of the two differently grown ZnO:Al transparent conductive oxide films of different thickness, was studied using X-ray diffraction θ/2θ scans. …”
Get full text
Article -
2364
Microstructure and Properties of Super-Ferritic Stainless Steels Used for Marine Construction after Fire Exposure
Published 2022-01-01“…When the fire exposure temperature was 700–800°C, the plasticity was exasperated and the value decreased to only 1.5% at the condition of 800°C × 4 h due to the bulk σ-phase precipitation at grain boundaries. Meanwhile, the brittle fracture patterns emerged, and the corrosion rate in FeCl3 solution increased to 0.4 mm/a. …”
Get full text
Article -
2365
Automatic Pipelining and Vectorization of Scientific Code for FPGAs
Published 2019-01-01“…The backend first creates fine and coarse-grained pipelines and then automatically vectorizes both the memory access and the datapath based on a cost model, generating an OpenCL-HDL hybrid working solution for FPGA targets on the Amazon cloud. …”
Get full text
Article -
2366
La créativité dans la production de fictions télévisées en France : une notion en trompe-l’œil ?
Published 2017-12-01“…Next, we provide a finer-grained analysis of the interactions which take place in the art world. …”
Get full text
Article -
2367
Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology
Published 2022-01-01“…Attribute encryption is an effective one to many network communication technologies, which supports flexible access control strategies and is very suitable for fine-grained access control in large-scale information systems. …”
Get full text
Article -
2368
Proximité entre riverains et pesticides en territoire de grandes cultures. Visibilité et invisibilité des micro-adaptations agricoles
Published 2021-12-01“…We mobilize the complementarity between field work and spatial analysis by GIS at the scale of the urban area of Poitiers agricultural region of grain crops. This work is located in arable farming areas - a seldom studied area whose low spatial roughness may allow new forms of adaptation. …”
Get full text
Article -
2369
Ground Pearls, Earth Pearls, Pearl Scale, Margarodes spp. (Insecta: Hemiptera: Margarodidae)
Published 2004-12-01“…The sphere is pink to yellowish-brown in color and measures from 1/6 of an inch in diameter to as small as a grain of sand (Short). The exposed mouthparts are used to feed and attach to the roots of plants. …”
Get full text
Article -
2370
Inter/Multimedial Constructions of Islam in Post-9/11 TV Series: The West Wing and 24
Published 2020-09-01“…Both series thus can be read against the grain, as contradictory, multivocal texts that both reflect and expose Islamophobia.…”
Get full text
Article -
2371
Graphene as a model system for 2D fracture behavior of perfect and defective solids
Published 2015-09-01“…This includes (multiple) vacancies in the subnanometer range, grain boundaries, slits in the nanometer region, and artificial pre-cracks with sizes of 30 nm to 1 ?…”
Get full text
Article -
2372
The quality of semi-finished steel
Published 2019-04-01“…When nitriding with heating to 490 ° C and holding at this temperature, there was a decay of bainite with the formation of tertiary cementite along the grain boundaries. Discussed the possibility of culling the poor quality of delivery at the consumer. …”
Get full text
Article -
2373
Domains and Functions: A Two-Dimensional Account of Discourse Markers
Published 2019-10-01“…., domains and functions) which, once combined, provide a fine-grained disambiguation of discourse markers. We compare the affordances of this model to existing proposals, and illustrate them with a corpus study. …”
Get full text
Article -
2374
‘Tactile qualities’
Published 2012-01-01“…But “tactile” cannot be understood without evoking the problematics of touch explored in Williams’s In the American Grain (1925), and according to which true democracy requires “Men intact—with all their senses waking”. …”
Get full text
Article -
2375
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01“…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
Get full text
Article -
2376
mVulSniffer: a multi-type source code vulnerability sniffer method
Published 2023-09-01“…Given the problem that the code slice used by existing deep learning-based vulnerability sniffer methods could not comprehensively encompass the subtle characteristics between vulnerability classes, and a single deep learning sniffer model had insufficient ability to learn long context-dependent information between cross-file and cross-function code statements, a multi-type source code vulnerability sniffer method was proposed.Firstly, fine-grained two-level slices containing the types of vulnerabilities were extracted based on the control dependency and data dependency information in program dependency graph.Secondly, the two-level slices were transformed into initial feature vector.Finally, a fusion model of deep learning vulnerability sniffer suitable for two-level slices was constructed to achieve accurate vulnerability detection of multi-type source code.The experimental results on multiple synthetic datasets and two real datasets show that the proposed method outperforms the existing multi-type source code vulnerability sniffer methods.…”
Get full text
Article -
2377
Ground Pearls, Earth Pearls, Pearl Scale, Margarodes spp. (Insecta: Hemiptera: Margarodidae)
Published 2004-12-01“…The sphere is pink to yellowish-brown in color and measures from 1/6 of an inch in diameter to as small as a grain of sand (Short). The exposed mouthparts are used to feed and attach to the roots of plants. …”
Get full text
Article -
2378
THE LOWER PALEOLITHIC INDUSTRY OF ANKHE IN VIETNAM WITH THE SO-CALLED MOVIUS LINE
Published 2019-09-01“…The An Khe industry is characterized by a collection of stone tools made of local river and stream quartz, quartzite pebbles which are large, hard, and fine grained. Typologically, the representative tools are a complex of bifacial tools/handaxes, picks/triangular-sectioned picks, and choppers/chopping tools. …”
Get full text
Article -
2379
Fault Diagnosis of Gearbox Multi-channel Vibration Signal based on Improved Multivariate Multiscale Dispersion Entropy
Published 2021-04-01“…Meanwhile, the coarse graining method of it is improved, and improved multivariate multiscale dispersion entropy(IMMDE) is proposed to extract fault information of multi-channel vibration signal of gearbox. …”
Get full text
Article -
2380
Experimental Study on Energy Dissipation of Saturated Mudstone in Coal Mine under Impact Loading
Published 2022-01-01“…The results show that under the back-and-forth reflection of the stress wave, the saturated mudstone specimens are characterized by circumferential failure and axial splitting damage, which appear in the rock grain interface. By energy analysis, the energy dissipation per volume (EDV), energy dissipation per mass (EDM), and absorption impedance energy ratio (AIER) are used to represent the energy dissipation characteristic of mudstone. …”
Get full text
Article