期刊文献+
共找到2,809篇文章
< 1 2 141 >
每页显示 20 50 100
Composite armor philosophy(CAP):Holistic design methodology of multi-layered composite protection systems for armored vehicles
1
作者 Evangelos Ch.Tsirogiannis Foivos Psarommatis +1 位作者 Alexandros Prospathopoulos Georgios Savaidis 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第11期181-197,共17页
A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented i... A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented in this study.CAP can serve as a guiding principle to assist designers in comprehending the distinct roles fulfilled by each component.The CAP proposal comprises four functional layers,organized in a suggested hierarchy of materials.Particularly notable is the inclusion of a ceramic-composite principle,representing an advanced and innovative solution in the field of armor design.This paper showcases real-world defense industry applications,offering case studies that demonstrate the effectiveness of this advanced approach.CAP represents a significant milestone in the history of passive protection,marking an evolutionary leap in the field.This philosophical approach provides designers with a powerful toolset with which to enhance the protection capabilities of military vehicles,making them more resilient and better equipped to meet the challenges of modern warfare. 展开更多
关键词 Passive armor protection Composite armor Ballistic performance protection systems Vehicle protection Armor design
在线阅读 下载PDF
Design and implementation of self-protection agent for network-based intrusion detection system 被引量:3
2
作者 ZHU Shu-ren(朱树人) LI Wei-qin(李伟琴) 《Journal of Central South University of Technology》 2003年第1期69-73,共5页
Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection ag... Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection agents were designed, which have the distributed architecture,cooperate with the agents in intrusion detection in a loose-coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self-protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network-based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network-based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks exist ing in some system service process and back-door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively. 展开更多
关键词 INTRUSION detection system (IDS) network-based INTRUSION detection system(NIDS) SELF-protection AGENT IP filter
在线阅读 下载PDF
Cued search algorithm with uncertain detection performance for phased array radars 被引量:2
3
作者 Jianbin Lu Hui Xiao +1 位作者 Zemin Xi Mingmin Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第6期938-945,共8页
A cued search algorithm with uncertain detection performance is proposed for phased array radars. Firstly, a target search model based on the information gain criterion is presented with known detection performance, a... A cued search algorithm with uncertain detection performance is proposed for phased array radars. Firstly, a target search model based on the information gain criterion is presented with known detection performance, and the statistical characteristic of the detection probability is calculated by using the fluctuant model of the target radar cross section (RCS). Secondly, when the detection probability is completely unknown, its probability density function is modeled with a beta distribution, and its posterior probability distribution with the radar observation is derived based on the Bayesian theory. Finally simulation results show that the cued search algorithm with a known RCS fluctuant model can achieve the best performance, and the algorithm with the detection probability modeled as a beta distribution is better than that with a random selected detection probability because the model parameters can be updated by the radar observation to approach to the real value of the detection probability. 展开更多
关键词 phased array radar detection performance cued search information gain beta distribution
在线阅读 下载PDF
Target acquisition performance in the presence of JPEG image compression
4
作者 Boban Bondzulic Nenad Stojanovic +3 位作者 Vladimir Lukin Sergey A.Stankevich Dimitrije Bujakovic Sergii Kryvenko 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期30-41,共12页
This paper presents an investigation on the effect of JPEG compression on the similarity between the target image and the background,where the similarity is further used to determine the degree of clutter in the image... This paper presents an investigation on the effect of JPEG compression on the similarity between the target image and the background,where the similarity is further used to determine the degree of clutter in the image.Four new clutter metrics based on image quality assessment are introduced,among which the Haar wavelet-based perceptual similarity index,known as HaarPSI,provides the best target acquisition prediction results.It is shown that the similarity between the target and the background at the boundary between visually lossless and visually lossy compression does not change significantly compared to the case when an uncompressed image is used.In future work,through subjective tests,it is necessary to check whether this presence of compression at the threshold of just noticeable differences will affect the human target acquisition performance.Similarity values are compared with the results of subjective tests of the well-known target Search_2 database,where the degree of agreement between objective and subjective scores,measured through linear correlation,reached a value of 90%. 展开更多
关键词 JPEG compression Target acquisition performance Image quality assessment Just noticeable difference Probability of target detection Target mean searching time
在线阅读 下载PDF
基于改进Deformable DETR的水面目标检测
5
作者 王鹏九 龚俊斌 +2 位作者 罗威 黄骁 郭俊杰 《中国舰船研究》 北大核心 2025年第3期305-317,共13页
[目的]旨在提出一种基于改进Deformable DETR的目标检测算法,实现对水面目标的智能识别,并在大幅提升算法模型推理和训练速度的同时提高检测准确率,以实现更加高效鲁棒的水面目标检测。[方法]构建一个新的水面目标数据集,使用轻量化的Mo... [目的]旨在提出一种基于改进Deformable DETR的目标检测算法,实现对水面目标的智能识别,并在大幅提升算法模型推理和训练速度的同时提高检测准确率,以实现更加高效鲁棒的水面目标检测。[方法]构建一个新的水面目标数据集,使用轻量化的MobileNetV3替换Deformable DETR原有特征提取网络并引入CBAM注意力机制模块,对Deformable DETR算法进行改进。通过在自构建的水面目标数据集和公开数据集ABOships开展消融实验以及横向对比试验验证改进算法的有效性。[结果]在自构建数据集和ABOships 2个数据集上的消融实验结果证明,改进算法模型相较原算法模型参数量及大小减少至1/3,m AP0.5:0.95分别提升2.4%和7.5%,训练耗时分别为原算法的41.7%和51.9%。在ABOships数据集上进行的不同算法性能的对比测试结果进一步证明所提出的改进算法在推理速度和检测精度综合性能上均具有优越性。[结论]DETR类算法在水面目标检测领域具有应用潜力。 展开更多
关键词 水面目标 目标检测 性能优化 目标跟踪 自动目标识别
在线阅读 下载PDF
High resolution radar target adaptive detector and performance assessment 被引量:7
6
作者 Tao Jian You He Feng Su Changwen Qu Dianfa Ping 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第2期212-218,共7页
The high resolution radar target detection is addressed in the non-Gaussian clutter. An adaptive detector is derived for range-spread target based on a novel covariance matrix estimator. It is proved that the new dete... The high resolution radar target detection is addressed in the non-Gaussian clutter. An adaptive detector is derived for range-spread target based on a novel covariance matrix estimator. It is proved that the new detector is constant false alarm rate (CFAR) to both of the clutter covariance matrix structure and power level theoretically for match cases. The simulation results show that the new detector is almost CFAR for mismatch cases, and it outperforms the existing adaptive detector based on the sample covariance matrix. It also shows that the detection performance improves, as the number of pulses, the number of secondary data or the clutter spike increases. In addition, the derived detector is robust to different subsets, estimated clutter group sizes and correlations of clutter. Importantly, the number of iterations for practical application is just one. 展开更多
关键词 non-Gaussian clutter adaptive detection range-spread target performance assessment.
在线阅读 下载PDF
Fault detection of switched linear systems with its application to turntable systems 被引量:1
7
作者 Guanghui Sun Mao Wang Xiuming Yao Ligang Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第1期120-126,共7页
This paper is concerned with the H∞ fault detection for continuous-time linear switched systems with its application to turntable systems.The solvability condition for a desired filter is established based on the pro... This paper is concerned with the H∞ fault detection for continuous-time linear switched systems with its application to turntable systems.The solvability condition for a desired filter is established based on the proposed sufficient condition.Based on the double channel scheme of the turntable control system,the turntable system can be modeled as a switched system.Finally,by taking the turntable system as a numerical example,the effectiveness of the proposed theory is well validated. 展开更多
关键词 fault detection H∞ performance exponential stability switched system turntable system.
在线阅读 下载PDF
Ballistic design and testing of a composite armour reinforced by CNTs suitable for armoured vehicles 被引量:1
8
作者 Evangelos Ch.Tsirogiannis Evangelos Daskalakis +2 位作者 Mohamed H.Hassan Abdalla M.Omar Paulo Bartolo 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期173-195,共23页
This paper is investigating the use of composite armour reinforced by nanomaterials, for the protection of light armoured(LAV) and medium armoured military vehicles(MAV), and the interaction between the composite mate... This paper is investigating the use of composite armour reinforced by nanomaterials, for the protection of light armoured(LAV) and medium armoured military vehicles(MAV), and the interaction between the composite materials and high-performance ballistic projectiles. Four armour materials, consisted of front hybrid fibre reinforced polymer cover layer, ceramic strike-face, fibre reinforced polymer intermediate layer and the metal matrix composite reinforced backplate, were manufactured and assembled by adhesive technology. The proposed laminated protection system is suitable for armoured ground vehicles;however, it could be used as armour on ground, air and naval platforms. The design of the protection system, including material selection and thickness, was elaborated depending on the performance requirements of Level 4 + STANAG 4569 military standard(projectile 14.5 mm × 114 mm API B32) and especially on a design philosophy which is analysed with the specifications. The backplate of this new composite is a hybrid material of Metal Matrix Composite(MMC) reinforced with carbon nanotubes(CNTs), manufactured with the use of powder metallurgy technique. The composite backplate material was morphologically, mechanically and chemically analysed. Results show that all plates are presenting high mechanical properties and ballistic characteristics, compared to commonly used armour plates. Real military ballistic tests according to AEP-STANAG 4569 were carried out for the total composite armour systems. After the ballistic tests, AA2024-CNT3 showed the best protection results, compared with the other plates(AA2024-CNT1 and AA2024-CNT2), with the projectile being unable to fully penetrate the composite plate. 展开更多
关键词 Passive armour protection Protective armour Ballistic performance Hybrid composites Vehicle protection
在线阅读 下载PDF
Research and Application of Platinum/tantalum Composite Anode for Cathodic Protection
9
作者 WANG Yi JIA Zhihua ZHENG Jing 《贵金属》 CAS CSCD 北大核心 2012年第A01期134-140,共7页
This paper introduces the research status and present situation of application of Pt/Ta composite anode materials for cathodic protection in China. It also introduces the corrosion resistance, bending properties and e... This paper introduces the research status and present situation of application of Pt/Ta composite anode materials for cathodic protection in China. It also introduces the corrosion resistance, bending properties and electrochemical performance in seawater and freshwater of the Pt/Ta composite anode materials for cathodic protection. It points out that compared with other platinum composite anodes, the Pt/Ta composite anode has the advantage of small volume, light weight, big drainage rate, long service life, it possesses superiority to be used in the confluence environment of sea water and fresh water and in the medium condition of resistivity changes at all times. 展开更多
关键词 cathodic protection platinum tantalum-composite performance APPLICATION
在线阅读 下载PDF
Heterogeneous performance analysis of the new model of CFAR detectors for partially-correlated χ~2-targets
10
作者 EL_MASHADE Mohamed Bakry 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第1期1-17,共17页
To mitigate the deleterious effects of clutter and jammer, modern radars have adopted adaptive processing techniques such as constant false alarm rate(CFAR) detectors which are widely used to prevent clutter and noise... To mitigate the deleterious effects of clutter and jammer, modern radars have adopted adaptive processing techniques such as constant false alarm rate(CFAR) detectors which are widely used to prevent clutter and noise interference from saturating the radar’s display and preventing targets from being obscured.This paper concerns with the detection analysis of the novel version of CFAR schemes(cell-averaging generalized trimmed-mean,CATM) in the presence of additional outlying targets other than the target under research. The spurious targets as well as the tested one are assumed to be fluctuating in accordance with the χ~2-model with two-degrees of freedom. In this situation, the processor performance is enclosed by the swerling models(SWI and SWII). Between these bounds, there is an important class of target fluctuation which is known as moderately fluctuating targets. The detection of this class has many practical applications. Structure of the CATM detector is described briefly. Detection performances for optimal, CAM, CA, trimmed-mean(TM) and ordered-statistic(OS) CFAR strategies have been analyzed and compared for desired probability of false alarm and determined size of the reference window. False alarm rate performance of these processors has been evaluated for different strengths of interfering signal and the effect of correlation among the target returns on the detection and false alarm performances has also been studied. Our numerical results show that, with a proper choice of trimming parameters,the novel model CAM presents an ideal detection performance outweighing that of the Neyman-Pearson detector on condition that the tested target obeys the SWII model in its fluctuation. Although the new models CAS and CAM can be treated as special cases of the CATM algorithm, their multi-target performance is modest even it has an enhancement relative to that of the classical CAcheme. Additionally, they fail to maintain the false alarm rate constant when the operating environment is of type target multiplicity. Moreover, the non-coherent integration of M pulses ameliorates the processor performance either it operates in homogeneous or multi-target environment. 展开更多
关键词 adaptive target detection multi-pulse performance noise and interference partially-correlated χ~2-targets SWI & SWII target fluctuation models target multiplicity environments
在线阅读 下载PDF
A high performance waveform and a new ranging method for the proximity detector
11
作者 Qi-le Chen Xin-hong Hao +1 位作者 Xiao-peng Yan Ping Li 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2020年第4期834-845,共12页
Signal modulation is an essential design factor for proximity detectors and directly affects the system's potential performance.In order to achieve the advantages of chaotic codes bi-phase modulation(CCBPM)and lin... Signal modulation is an essential design factor for proximity detectors and directly affects the system's potential performance.In order to achieve the advantages of chaotic codes bi-phase modulation(CCBPM)and linear frequency modulation(LFM) simultaneously,this paper designed a waveform which combined chaotic codes bi-phase modulation and linear frequency modulation(CCBPM-LFM) for proximity detectors.The CCBPM-LFM waveform was analyzed in the aspect of time delay resolution(TDR) and Doppler tolerance(DT) based on ambiguity function(AF).Then,a ranging method,which we called instant correlation harmonic demodulation(ICHD),was presented for the detector using the CCBPM-LFM waveform.By combining time domain instant correlation with harmonic demodulation,the ICHD solved the problem caused by combination modulation and made the most of the linear frequency modulation(LFM) harmonics and the correlation of chaotic codes.Finally,a prototype was implemented and ranging experiments were carried out.From the theoretical analysis and experimental results,the proximity detector used the CCBPM-LFM waveform has an outstanding detection performance. 展开更多
关键词 Proximity detectors detection performance Combination modulation Chaotic codes bi-phase modulation Linear frequency modulation
在线阅读 下载PDF
基于改进YOLOv8算法的在线听课行为识别模型研究 被引量:1
12
作者 李猛坤 袁晨 +3 位作者 王琪 赵冲 陈景轩 刘立峰 《计算机工程》 北大核心 2025年第1期287-294,共8页
目前目标检测技术日趋成熟,但是针对在线听课行为的识别仍存在挑战。针对在线课堂人为监管力度不足、目标检测模型复杂度较高所导致的在线课堂行为识别不精准、模型计算量较高等问题,提出一种基于改进的YOLOv8在线听课行为检测与识别方... 目前目标检测技术日趋成熟,但是针对在线听课行为的识别仍存在挑战。针对在线课堂人为监管力度不足、目标检测模型复杂度较高所导致的在线课堂行为识别不精准、模型计算量较高等问题,提出一种基于改进的YOLOv8在线听课行为检测与识别方法。首先在YOLOv8n的基础上添加BiFPN双向特征金字塔网络来进行特征融合,以增加特征提取的能力,提高模型识别准确度;其次在Head端采用C3Ghost模块替代C2f模块,以大幅减少模型计算量。实验结果表明,提出的YOLOv8n-BiFPN-C3Ghost模型在线上听课行为数据集上的mAP@0.5和mAP@0.5∶0.95指标分别为98.6%和92.6%,相比其他课堂行为识别模型在精度上最高提升了4.2%和5.7%,计算量为6.6 GFLOPS,比原模型降低了19.5%。YOLOv8n-BiFPN-C3Ghost模型能以更低的运算成本精确地实现在线听课行为的检测和识别,可以实现对学生在线课堂学习情况的动态、科学识别。 展开更多
关键词 目标检测 在线课堂 听课行为识别 性能优化 特征融合
在线阅读 下载PDF
过瘤胃氨基酸对藏西北绒山羊生长性能、血浆指标及瘤胃内环境的影响
13
作者 达瓦 索朗达 +5 位作者 巴桑玉珍 阿旺措吉 巴贵 德吉 吴玉江 仁青措姆 《中国草食动物科学》 北大核心 2025年第2期25-33,共9页
本试验旨在探究过瘤胃氨基酸对藏西北绒山羊生长性能、血浆生化指标、抗氧化指标及瘤胃内环境的影响。试验选取12月龄的藏西北绒山羊32只,随机分为4组,每组8个重复(公母各半),每个重复1只羊。对照组羊饲喂基础饲粮,RPMet组羊饲喂基础饲... 本试验旨在探究过瘤胃氨基酸对藏西北绒山羊生长性能、血浆生化指标、抗氧化指标及瘤胃内环境的影响。试验选取12月龄的藏西北绒山羊32只,随机分为4组,每组8个重复(公母各半),每个重复1只羊。对照组羊饲喂基础饲粮,RPMet组羊饲喂基础饲粮+0.5%RPMet(过瘤胃蛋氨酸),RPLys组羊饲喂基础饲粮+1%RPLys(过瘤胃赖氨酸),RPLys+RPMet组羊饲喂基础饲粮+0.5%RPMet+1%RPLys,预试期7 d,正试期49 d。结果显示,RPLys组和RPLys+RPMet组羊的末重(FBW)和平均日采食量(ADFI)显著高于对照组和RPMet组(P<0.05);各试验组的平均日增重(ADG)显著高于对照组(P<0.05)。试验第21天,各试验组的血浆尿素氮(BUN)和丙二醛(MDA)含量显著低于对照组(P<0.05),谷胱甘肽过氧化物酶(GSH-Px)活性显著高于对照组(P<0.05);试验第49天,RPMet组和RPLys+RPMet组的总超氧化物歧化酶(T-SOD)活性显著高于对照组(P<0.05),RPMet组的GSH-Px活性显著高于对照组(P<0.05)。RPMet组和RPLys+RPMet组的血浆蛋氨酸(Met)含量显著高于对照组(P<0.05);各试验组的血浆天冬氨酸(Asp)、谷氨酸(Glu)、丝氨酸(Ser)、精氨酸(Arg)和总氨基酸(TAA)含量均显著高于对照组(P<0.05);苯丙氨酸(Phe)含量RPLys组最高,对照组最低,两者差异显著(P<0.05),RPMet组与RPLys+RPMet组间差异不显著(P>0.05)。RPMet+RPLys组的瘤胃氨态氮(NH3-N)含量显著高于对照组(P<0.05);RPMet组和RPMet+RPLys组的微生物蛋白(MCP)含量显著高于对照组(P<0.05);瘤胃液总挥发性脂肪酸各组间均无显著差异(P>0.05)。综上,过瘤胃蛋氨酸和赖氨酸可以显著提高藏西北绒山羊的生长性能和血浆抗氧化能力,对瘤胃挥发性脂肪酸的产生没有影响。 展开更多
关键词 藏西北绒山羊 过瘤胃蛋氨酸 过瘤胃赖氨酸 生长性能 血浆指标 瘤胃内环境
在线阅读 下载PDF
肌酐降解酶系的构建及其应用
14
作者 周丽亚 崔思凡 +2 位作者 马丽 张悦 刘运亭 《化学研究与应用》 北大核心 2025年第5期1126-1133,共8页
肌酐作为生物标志物在评估肾脏功能中应用广泛,酶法检测肌酐由于具有抗干扰性能好、准确度高、交叉污染少等优势,而受到越来越多的关注。本文将酶法检测的关键工具酶—肌酐酶、肌酸酶和肌氨酸氧化酶应用于肌酐的检测,探究了三酶级联催... 肌酐作为生物标志物在评估肾脏功能中应用广泛,酶法检测肌酐由于具有抗干扰性能好、准确度高、交叉污染少等优势,而受到越来越多的关注。本文将酶法检测的关键工具酶—肌酐酶、肌酸酶和肌氨酸氧化酶应用于肌酐的检测,探究了三酶级联催化体系,优化了三酶加入比例和色原种类,优化后的检测体系对肌酐的检测限为0.091 mmol·L^(-1)。为提高肌酐检测体系的稳定性,分别采用单因素与正交实验考察了糖类保护剂、有机溶剂和非离子表面活性剂对酶活的影响,结果表明蔗糖、山梨醇、Tween-20和甘油为复合保护剂时,4℃下储存42 d酶活仍能保留初始酶活的64.98%。最后将该检测体系用于肌酐的检测,并与市售的肌酐检测试剂盒进行对比,在检测范围内本文制备的检测体系误差更小。 展开更多
关键词 肌酐酶 肌酸酶 肌氨酸氧化酶 性能检测
在线阅读 下载PDF
车联网中可信隐私保护的恶意行为检测方案研究
15
作者 江荣旺 梁志勇 +1 位作者 龙草芳 杨明 《现代电子技术》 北大核心 2025年第11期77-83,共7页
由于集中式数据中心存在隐私泄露问题,使得车联网恶意攻击检测缺乏真实数据和最新数据,导致基于人工智能技术的车联网恶意行为检测的发展受到了限制。为了解决上述车联网恶意攻击检测缺乏真实数据和最新数据等问题,文中提出基于联邦学... 由于集中式数据中心存在隐私泄露问题,使得车联网恶意攻击检测缺乏真实数据和最新数据,导致基于人工智能技术的车联网恶意行为检测的发展受到了限制。为了解决上述车联网恶意攻击检测缺乏真实数据和最新数据等问题,文中提出基于联邦学习和区块链技术的车联网恶意行为检测框架。文中所提框架是一种基于边缘服务器的分布式架构,允许多个边缘节点在保护隐私的同时安全合作;该框架还包括基于区块链技术的信任管理模块,用于维护车联网内联邦学习过程所使用数据的可靠性和可信度;信任管理模块管理各节点的信任数据,保证联邦学习训练过程的完整性和可靠性。实验所使用的数据集是VeReMi数据集。实验结果表明,所提框架在保护隐私的情况下,也具有较高的恶意行为检测性能。减少通信延迟,提高系统整体安全性;联邦学习在保护隐私的情况下实现车辆之间的协作学习;区块链则确保了联邦学习训练过程中数据的可信度和可靠性。 展开更多
关键词 车联网 隐私保护 恶意行为检测 联邦学习 区块链 集中式 分布式 机器学习
在线阅读 下载PDF
CBFuzzer:基于执行上下文导向及保护突破的程序缺陷模糊检测
16
作者 唐成华 蔡维嘉 +1 位作者 杨萌萌 强保华 《计算机研究与发展》 北大核心 2025年第3期790-807,共18页
大量的应用实践证明了模糊测试用于检测程序脆弱性的有效性.现有的模糊测试方法缺少针对具体测试任务表现的差异性进行分析并适当地调整测试策略,更多的是采取统一流程导致测试结果差强人意.有必要根据测试过程中的具体信息对策略进行... 大量的应用实践证明了模糊测试用于检测程序脆弱性的有效性.现有的模糊测试方法缺少针对具体测试任务表现的差异性进行分析并适当地调整测试策略,更多的是采取统一流程导致测试结果差强人意.有必要根据测试过程中的具体信息对策略进行修正以达到更好的测试表现,提出了一种新的基于执行上下文导向的程序缺陷模糊测试方法,并能突破保护机制,通过捕获并分析受检程序对输入测试用例实际处理过程中的具体上下文信息,快速探索程序结构特征,对样本突变策略进行优化.同时,在相关算法的基础上实现了基于执行上下文导向的程序缺陷模糊检测原型工具CBFuzzer.实验结果表明,CBFuzzer能有效地实现对程序内部结构的快速探索(包括对保护机制的突破)、非常规程序状态转换的模拟以及更高效的脆弱点暴露.与对照方法相比,CBFuzzer在脆弱点暴露能力方面有6.8%~36.76%不同程度的提升,实际脆弱点的检出数量提升率最高达到66.67%.在可接受范围内的少量额外测试资源的投入下,CBFuzzer不仅在常规漏洞类型的检出效果上得到提高,并且对于隐匿性强的漏洞类型有更高的检测能力.截至2023年8月10日,通过CBFuzzer在13个测试任务中共发现了126个新的漏洞(已报告给软件开发者,并提交给CVE?组织). 展开更多
关键词 程序缺陷 执行上下文 保护机制 模糊测试 漏洞检测
在线阅读 下载PDF
手机表面缺陷的机器视觉检测方法研究进展 被引量:1
17
作者 吴一全 庞雅轩 《智能系统学报》 北大核心 2025年第1期33-51,共19页
智能手机在现代人们的学习、工作与生活中扮演着十分重要的角色,手机的大批量生产给手机表面(手机屏幕玻璃盖板、手机外壳)缺陷检测工作提出了更高的要求,而基于机器视觉的检测方式能够更加快速准确地实现对手机表面缺陷的检测。以该领... 智能手机在现代人们的学习、工作与生活中扮演着十分重要的角色,手机的大批量生产给手机表面(手机屏幕玻璃盖板、手机外壳)缺陷检测工作提出了更高的要求,而基于机器视觉的检测方式能够更加快速准确地实现对手机表面缺陷的检测。以该领域面临的挑战为思路,总结了近10年来基于机器视觉的手机表面缺陷检测的研究进展。首先列举了手机表面存在的典型缺陷,并分析了机器视觉应用于手机表面缺陷检测工作中面临的部分难题,其中包括算法的精度、实时性、鲁棒性3个方面;然后分别针对上述问题的改进方法进行了分析与对比;进一步总结了目前可供使用的手机表面缺陷数据集及算法的性能评价指标;最后根据手机表面缺陷检测领域面临的问题进行了总结与展望。 展开更多
关键词 机器视觉 缺陷检测 手机屏幕玻璃盖板 手机外壳 深度学习 数据集 性能评价指标 图像处理
在线阅读 下载PDF
基于同源录波数据比对的继电保护采样回路异常检测方法
18
作者 戴志辉 张富泽 韩笑 《电力系统保护与控制》 北大核心 2025年第1期147-159,共13页
处于改建阶段的智能变电站采样模式复杂,继电保护装置难以发现采样回路轻微异常,导致回路隐患暴露时间严重滞后。针对上述问题,分析改建时期智能变电站的采样模式和二次设备配置情况,提出基于同源录波数据比对的继电保护采样回路异常检... 处于改建阶段的智能变电站采样模式复杂,继电保护装置难以发现采样回路轻微异常,导致回路隐患暴露时间严重滞后。针对上述问题,分析改建时期智能变电站的采样模式和二次设备配置情况,提出基于同源录波数据比对的继电保护采样回路异常检测方法。首先,利用双向编码器表征(bidirectional encoder representations from transformers,BERT)语言模型与余弦相似度算法,实现同源录波数据的通道匹配。然后,利用重采样技术和曼哈顿距离完成波形的采样频率统一与时域对齐。最后,基于动态时间规整(dynamic time warping,DTW)算法提出改进算法,并结合采样点偏移量共同设置采样回路的异常判据。算例分析表明,该方法可以完成录波数据的同源通道匹配,实现波形的一致性对齐,并且相比于传统DTW算法,改进DTW算法对异常状态识别的灵敏性和准确性更高。根据异常判据能够有效检测继电保护采样回路的异常状态,确保了智能变电站的安全可靠运行。 展开更多
关键词 继电保护装置 采样回路 异常检测 改进DTW算法 录波数据
在线阅读 下载PDF
基于空中计算CoMAC架构的不同计算场景叠加符号判决算法
19
作者 秦晓卫 周子涵 陈力 《中山大学学报(自然科学版)(中英文)》 CAS 北大核心 2025年第1期61-70,共10页
本文研究不同场景下基于空中计算的多址信道计算(CoMAC)架构的覆盖符号决策算法。首先,从理论上分析了XOR、ADD、MOD三种场景中加性高斯白噪声(AWGN)多址接入信道下叠加符号的概率密度分布,提出了一种基于先验概率的最优门限判决策略。... 本文研究不同场景下基于空中计算的多址信道计算(CoMAC)架构的覆盖符号决策算法。首先,从理论上分析了XOR、ADD、MOD三种场景中加性高斯白噪声(AWGN)多址接入信道下叠加符号的概率密度分布,提出了一种基于先验概率的最优门限判决策略。其次,推导了系统最优门限及对应误码率的理论表达式。最后,通过仿真验证了不同信噪比、传感器节点个数及先验概率对于该门限判决方案的鲁棒性和可靠性的影响。与通信计算相分离的传统方案相比,空中计算判决方案具有更好的检测性能,为多址接入信道下的信号识别提供了新的参考方案。 展开更多
关键词 空中计算 多址接入信道 最优门限判决 检测性能
在线阅读 下载PDF
煤层抽采钻孔用高性能微泡沫钻孔冲洗液研制
20
作者 张学博 屈朕 +1 位作者 王攀 潘荣锟 《矿业科学学报》 北大核心 2025年第2期292-304,共13页
针对传统的清水和无水冲洗液易导致钻孔变形和坍塌的问题,通过优选发泡剂、稳泡剂、膨润土和降滤失剂,构建一种微泡沫钻孔冲洗液体系,并通过室内模拟实验建立松软煤层相似材料模型,开展抽采钻孔模拟实验,分析微泡沫钻孔冲洗液的护孔效... 针对传统的清水和无水冲洗液易导致钻孔变形和坍塌的问题,通过优选发泡剂、稳泡剂、膨润土和降滤失剂,构建一种微泡沫钻孔冲洗液体系,并通过室内模拟实验建立松软煤层相似材料模型,开展抽采钻孔模拟实验,分析微泡沫钻孔冲洗液的护孔效果。研究表明:①微泡沫钻孔冲洗液体系黏度适中,流变性能良好,动塑比高,滤失量小,密度为0.38 g/cm^(3),半衰期超过90 h,具有较厚的水化膜,稳定性强,粒径大小呈现正态分布,平均粒径为158μm;②微泡沫钻孔冲洗液携岩能力约为清水的67倍;③煤层岩样在微泡沫钻孔冲洗液中的膨胀量为0.2 mm,滚动回收率为96.4%,表明微泡沫钻孔冲洗液具有良好的抑制性能,能够维持瓦斯抽采钻孔的孔壁稳定性;④微泡沫钻孔冲洗液抗温性能良好,护孔效果好,能够有效阻止水分渗入煤层,防止抽采钻孔孔壁失稳坍塌。 展开更多
关键词 钻孔瓦斯抽采 微泡沫钻孔冲洗液 性能评价 护孔效果
在线阅读 下载PDF
上一页 1 2 141 下一页 到第
使用帮助 返回顶部