期刊文献+
共找到61,969篇文章
< 1 2 250 >
每页显示 20 50 100
Windows平台微信数据恢复方法
1
作者 朱兵 刘铁铭 石佳琪 《计算机应用与软件》 北大核心 2025年第2期367-373,共7页
微信作为目前使用率极高的即时通信工具,存储了大量取证所需的重要数据。取证人员最关心的是对微信进行数据恢复与取证,恢复出来的微信数据可能会成为司法取证的关键证据,直接影响案件能否成功侦破。该文对Windows平台的微信数据恢复方... 微信作为目前使用率极高的即时通信工具,存储了大量取证所需的重要数据。取证人员最关心的是对微信进行数据恢复与取证,恢复出来的微信数据可能会成为司法取证的关键证据,直接影响案件能否成功侦破。该文对Windows平台的微信数据恢复方法进行研究,提出基于SQLite数据库存储结构分析恢复方法。该方法在深入分析Windows平台微信数据库文件存储结构的基础上,融合多个数据库文件,基于数据库中存在的空闲页和自由块对微信删除数据进行恢复。通过实验验证了Windows平台数据恢复方法的可行性与有效性。 展开更多
关键词 windows SQLITE 存储结构 数据恢复
在线阅读 下载PDF
基于深度强化学习的Windows域渗透攻击路径生成方法
2
作者 霍兴鹏 沙乐天 +2 位作者 刘建文 吴尚 苏子悦 《计算机科学》 北大核心 2025年第3期400-406,共7页
Windows域被视作内网渗透测试的重点目标,然而Windows域渗透测试的场景和方法与常规的内网渗透有很大差异。因此,当前常规的智能化路径发现研究并不适用于Windows域环境。为了增强Windows域的安全防护,提出了一种基于深度强化学习的Wind... Windows域被视作内网渗透测试的重点目标,然而Windows域渗透测试的场景和方法与常规的内网渗透有很大差异。因此,当前常规的智能化路径发现研究并不适用于Windows域环境。为了增强Windows域的安全防护,提出了一种基于深度强化学习的Windows域渗透测试路径自动化生成方法。首先,将Windows域渗透测试场景建模为马尔可夫决策过程,通过OpenAI的Gymnasium设计了一个适用于强化学习的模拟器;其次,为了解决在大动作空间和观察空间下的探索不充分问题,提出了通过先验知识对冗余动作进行削减并对无效观察空间进行压缩的方法;最后,在小型服务器中利用虚拟机技术部署Windows域环境,以NDD-DQN作为基础算法,实现了在真实环境中从信息收集、模型构建到路径生成的全流程自动化。实验结果表明,所提方法在真实的Windows复杂环境中具有良好的模拟和训练效果。 展开更多
关键词 渗透测试 windows 深度强化学习 DQN算法 攻击路径
在线阅读 下载PDF
基于系统调用接口的Windows驱动程序漏洞挖掘方法
3
作者 毕野川 彭建山 林志强 《计算机应用与软件》 北大核心 2025年第1期359-366,共8页
面向Windows内核和驱动程序的模糊测试有无效种子变异和效率不高的问题。在基于系统调用接口的模糊测试的基础上使用Intel Processor Trace提供代码覆盖率进行驱动程序的漏洞挖掘,并通过维持接口参数数据结构进行针对性的数据变异,实现... 面向Windows内核和驱动程序的模糊测试有无效种子变异和效率不高的问题。在基于系统调用接口的模糊测试的基础上使用Intel Processor Trace提供代码覆盖率进行驱动程序的漏洞挖掘,并通过维持接口参数数据结构进行针对性的数据变异,实现驱动程序的模糊测试框架——kifuzzer。实验证明,kifuzzer比其他针对ioctl(input/output control)的驱动程序挖掘方法效率大幅提高。 展开更多
关键词 windows内核安全 漏洞挖掘 驱动程序 ioctl的模糊测试
在线阅读 下载PDF
基于Windows API的嵌入式产品数据分析系统设计
4
作者 王怡 张华俊 《技术与市场》 2025年第1期49-53,共5页
Windows API为嵌入式产品的数据分析提供了一种很好的实现方式,适合不复杂的应用工况。提出一种基于Windows API的嵌入式产品数据分析系统的设计方案,使用Windows API的高级控件列表视图,对嵌入式产品中所存储的数据进行解析和显示,依... Windows API为嵌入式产品的数据分析提供了一种很好的实现方式,适合不复杂的应用工况。提出一种基于Windows API的嵌入式产品数据分析系统的设计方案,使用Windows API的高级控件列表视图,对嵌入式产品中所存储的数据进行解析和显示,依据数据存储的特点,在列表视图中进行分页设计。经验证,该方案的解析逻辑准确,显示内容无误,利用Windows的运行机制极大地提高了软件的兼容性、便利性和可用性。 展开更多
关键词 windows API 嵌入式产品 数据分析 列表视图 分页
在线阅读 下载PDF
Susceptible Windows of Prenatal Ozone Exposure and Preterm Birth:A Hospital-Based Observational Study
5
作者 Rongrong Qu Dongqin Zhang +7 位作者 Hanying Li Jiayin Zhi Yanxi Chen Ling Chao Zhenzhen Liang Chenguang Zhang Weidong Wu Jie Song 《Biomedical and Environmental Sciences》 2025年第2期255-260,I0001-I0004,共10页
Preterm birth(PTB)is defined as delivery before 37 weeks of gestation.PTB is associated with increased cardiovascular risk,neurodevelopmental disorders,and other diseases in infancy,childhood,and adulthood[1].Globally... Preterm birth(PTB)is defined as delivery before 37 weeks of gestation.PTB is associated with increased cardiovascular risk,neurodevelopmental disorders,and other diseases in infancy,childhood,and adulthood[1].Globally,approximately 15 million PTB cases are reported annually,posing a huge burden on individual families and the community economy[2].In the context of climate warming,O_(3) pollution has continuously increased in many countries in recent years,including China;therefore,scientific communities and government agencies must strive to mitigate ozone pollution. 展开更多
关键词 windows INDIVIDUAL annually
在线阅读 下载PDF
通过交叉验证堆栈和VAD信息检测Windows代码注入
6
作者 翟继强 韩旭 +2 位作者 王家乾 孙海旭 杨海陆 《哈尔滨理工大学学报》 CAS 北大核心 2024年第2期43-51,共9页
Windows 32/64位代码注入攻击是恶意软件常用的攻击技术,在内存取证领域,现存的代码注入攻击检测技术在验证完整性方面不能处理动态内容,并且在解析内存中数据结构方面无法兼容不同版本的Windows系统。因此提出了通过交叉验证进程堆栈和... Windows 32/64位代码注入攻击是恶意软件常用的攻击技术,在内存取证领域,现存的代码注入攻击检测技术在验证完整性方面不能处理动态内容,并且在解析内存中数据结构方面无法兼容不同版本的Windows系统。因此提出了通过交叉验证进程堆栈和VAD信息定位注入代码方法,将基于遍历栈帧得到的函数返回地址、模块名等信息结合进程VAD结构来检测函数返回地址、匹配文件名以定位注入代码,并且研发了基于Volatility取证框架的Windows代码注入攻击检测插件codefind。测试结果表明,即使在VAD节点被恶意软件修改,方法仍能够有效定位Windows 32/64位注入代码攻击。 展开更多
关键词 VAD 堆栈 windows代码注入 内存取证技术
在线阅读 下载PDF
基于Windows/RTX的实时仿测软件设计 被引量:1
7
作者 李勇波 田润梅 +2 位作者 张辉 郭善鹏 李琪 《系统仿真学报》 CAS CSCD 北大核心 2024年第6期1468-1474,共7页
针对传统测试软件实时性有限、传统仿真接口软件通用性程度低的问题,为满足半实物仿真软件需兼顾单元测试和控制系统仿真验证的需求,设计了基于Windows/RTX的实时仿测软件。仿测软件采用模块化的设计原则,开发了GUI层人机交互界面和RTX... 针对传统测试软件实时性有限、传统仿真接口软件通用性程度低的问题,为满足半实物仿真软件需兼顾单元测试和控制系统仿真验证的需求,设计了基于Windows/RTX的实时仿测软件。仿测软件采用模块化的设计原则,开发了GUI层人机交互界面和RTX层实时运行程序。为保证实时性,采用无锁循环缓冲区+双线程技术,解决了RTX环境下仿真步长为1 ms时串口数据收发的超时问题;提出一种超时检测算法监测仿真节点的实时状态。借助cJSON优化了测试用例配置文件,用户可以更灵活地编辑测试用例,利用RTW自动代码生成将弹体模型编译集成到RTX仿测软件工程。实验结果表明:该仿测软件有效兼顾了单测与仿真,提高了仿测软件的通用性和二次开发效率,降低了开发难度。 展开更多
关键词 windows/RTX 实时 部件单测 半实物仿真
在线阅读 下载PDF
基于Windows Server Failover Cluster的Apache故障转移集群应用实践
8
作者 李应晓 矫健 +2 位作者 宋庆章 吴连强 徐庶 《长江信息通信》 2024年第10期166-168,共3页
在当前互联网时代,Web应用程序的高可用性和可靠性是确保业务持续运行的关键因素。针对Apache Web服务器,介绍了利用Windows Server 2019 Failover Cluster构建Apache故障转移集群的实践方案。通过配置两个节点的故障转移集群,当某个节... 在当前互联网时代,Web应用程序的高可用性和可靠性是确保业务持续运行的关键因素。针对Apache Web服务器,介绍了利用Windows Server 2019 Failover Cluster构建Apache故障转移集群的实践方案。通过配置两个节点的故障转移集群,当某个节点发生故障时,Apache服务将自动在另一个节点上重新启动,从而最大程度地减少系统中断的时间,提高Web应用的可用性。详细阐述了集群搭建的具体步骤、配置要点、集群验证方法以及运行时的监控与维护方法,为构建高可用Apache Web服务器提供一种实用的解决方案。 展开更多
关键词 windows Server 2019 Failover Cluster APACHE 故障转移 集群
在线阅读 下载PDF
Bimetallic In_(2)O_(3)/Bi_(2)O_(3) Catalysts Enable Highly Selective CO_(2) Electroreduction to Formate within Ultra-Broad Potential Windows 被引量:1
9
作者 Zhongxue Yang Hongzhi Wang +7 位作者 Xinze Bi Xiaojie Tan Yuezhu Zhao Wenhang Wang Yecheng Zou Huai ping Wang Hui Ning Mingbo Wu 《Energy & Environmental Materials》 SCIE EI CAS CSCD 2024年第1期257-264,共8页
CO_(2)electrochemical reduction reaction(CO_(2)RR)to formate is a hopeful pathway for reducing CO_(2)and producing high-value chemicals,which needs highly selective catalysts with ultra-broad potential windows to meet... CO_(2)electrochemical reduction reaction(CO_(2)RR)to formate is a hopeful pathway for reducing CO_(2)and producing high-value chemicals,which needs highly selective catalysts with ultra-broad potential windows to meet the industrial demands.Herein,the nanorod-like bimetallic ln_(2)O_(3)/Bi_(2)O_(3)catalysts were successfully synthesized by pyrolysis of bimetallic InBi-MOF precursors.The abundant oxygen vacancies generated from the lattice mismatch of Bi_(2)O_(3)and ln_(2)O_(3)reduced the activation energy of CO_(2)to*CO_(2)·^(-)and improved the selectivity of*CO_(2)·^(-)to formate simultaneously.Meanwhile,the carbon skeleton derived from the pyrolysis of organic framework of InBi-MOF provided a conductive network to accelerate the electrons transmission.The catalyst exhibited an ultra-broad applied potential window of 1200 mV(from-0.4 to-1.6 V vs RHE),relativistic high Faradaic efficiency of formate(99.92%)and satisfactory stability after 30 h.The in situ FT-IR experiment and DFT calculation verified that the abundant oxygen vacancies on the surface of catalysts can easily absorb CO_(2)molecules,and oxygen vacancy path is dominant pathway.This work provides a convenient method to construct high-performance bimetallic catalysts for the industrial application of CO_(2)RR. 展开更多
关键词 bimetallic catalyst CO_(2)electrochemical reduction reaction FORMATE oxygen vacancy wide potential window
在线阅读 下载PDF
基于多目标优化算法的机场终端VRPTW研究
10
作者 黄春丽 吴永强 《科技和产业》 2025年第4期58-63,共6页
针对机场终端带有时间窗的车辆路径问题(VRPTW),提出一种基于遗传算法(GA)、模拟退火(SA)和自适应大邻域搜索(ALNS)的多目标混合优化算法框架。该模型综合车辆派遣成本和时间窗惩罚成本的最小化,并考虑揽货中心资源共享的影响。通过K-Me... 针对机场终端带有时间窗的车辆路径问题(VRPTW),提出一种基于遗传算法(GA)、模拟退火(SA)和自适应大邻域搜索(ALNS)的多目标混合优化算法框架。该模型综合车辆派遣成本和时间窗惩罚成本的最小化,并考虑揽货中心资源共享的影响。通过K-Means聚类、模拟退火优化站点遍历次序以及遗传算法优化货运点货物量级分类,实现算法的高效求解。结果表明,该算法降低了揽货中心16.88%总成本,验证了模型的有效性和实用性。 展开更多
关键词 vrptw 路径规划 时间窗 混合算法 机场终端
在线阅读 下载PDF
具有时间窗约束松弛的混合蚁群算法求解VRPTW
11
作者 骆维 陈仕军 吴华伟 《计算机系统应用》 2025年第2期281-291,共11页
为求解带时间窗的车辆路径问题,以最小化总行驶里程为目标建立混合整数规划模型,提出了一种具有时间窗约束松弛的混合蚁群算法.首先,提出改进的蚁群算法与“TSP-Split编码与解码”相结合的方法,来构建允许违反时间窗约束的解路径,以提... 为求解带时间窗的车辆路径问题,以最小化总行驶里程为目标建立混合整数规划模型,提出了一种具有时间窗约束松弛的混合蚁群算法.首先,提出改进的蚁群算法与“TSP-Split编码与解码”相结合的方法,来构建允许违反时间窗约束的解路径,以提高算法的全局寻优能力.然后,利用“及时返回”原则和惩罚函数方法,提出基于变邻域搜索的修复策略来修复不可行解.最后,对56个Solomon和12个Homberger基准算例进行试验计算,结果表明该算法的求解质量优于文献中的对比算法,且在50个测试实例上获得了已知最优解,其余实例也能在可接受计算时间内获得准最优解,验证了所提算法的有效性. 展开更多
关键词 蚁群算法 带时间窗的车辆路径问题(vrptw) 时间窗约束松弛 TSP-Split 及时返回 变邻域搜索
在线阅读 下载PDF
Strong Interaction Between Redox Mediators and Defect-Rich Carbons Enabling Simultaneously Boosted Voltage Windows and Capacitance for Aqueous Supercapacitors
12
作者 Lu Guan Yifan Zhu +8 位作者 Yi Wan Mengdi Zhang Qiang Li Xiaoling Teng Yunlong Zhang Hao Yang Yan Zhang Han Hu Mingbo Wu 《Energy & Environmental Materials》 SCIE EI CAS CSCD 2024年第4期269-276,共8页
Energy density,the Achilles’heel of aqueous supercapacitors,is simultaneously determined by the voltage window and specific capacitance of the carbon materials,but the strategy of synchronously boosting them has rare... Energy density,the Achilles’heel of aqueous supercapacitors,is simultaneously determined by the voltage window and specific capacitance of the carbon materials,but the strategy of synchronously boosting them has rarely been reported.Herein,we demonstrate that the rational utilization of the interaction between redox mediators(RMs)and carbon electrode materials,especially those with rich intrinsic defects,contributes to extended potential windows and more stored charges concurrently.Using 4-hydroxy-2,2,6,6-tetramethylpiperidinyloxyl(4OH-TEMPO)and intrinsic defect-rich carbons as the RMs and electrode materials,respectively,the potential window and capacitance are increased by 67%and sixfold in a neutral electrolyte.Moreover,this strategy could also be applied to alkaline and acid electrolytes.The first-principle calculation and experimental results demonstrate that the strong interaction between 4OH-TEMPO and defectrich carbons plays a key role as preferential adsorbed RMs may largely prohibit the contact of free water molecules with the electrode materials to terminate the water splitting at elevated potentials.For the RMs offering weaker interaction with the electrode materials,the water splitting still proceeds with a thus sole increase of the stored charges.The results discovered in this work could provide an alternative solution to address the low energy density of aqueous supercapacitors. 展开更多
关键词 defect-rich carbons redox mediators strong interaction SUPERCAPACITORS voltage windows
在线阅读 下载PDF
AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics
13
作者 Juhwan Kim Baehoon Son +1 位作者 Jihyeon Yu Joobeom Yun 《Computers, Materials & Continua》 SCIE EI 2024年第11期3371-3393,共23页
Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the comp... Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the compromised systems.Forensic analysts are tasked with extracting and subsequently analyzing data,termed as artifacts,from these systems to gather evidence.Therefore,forensic analysts must sift through extensive datasets to isolate pertinent evidence.However,manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive.Previous studies addressed such inefficiencies by integrating artificial intelligence(AI)technologies into digital forensics.Despite the efforts in previous studies,artifacts were analyzed without considering the nature of the data within them and failed to prove their efficiency through specific evaluations.In this study,we propose a system to prioritize suspicious artifacts from compromised systems infected with malware to facilitate efficient digital forensics.Our system introduces a double-checking method that recognizes the nature of data within target artifacts and employs algorithms ideal for anomaly detection.The key ideas of this method are:(1)prioritize suspicious artifacts and filter remaining artifacts using autoencoder and(2)further prioritize suspicious artifacts and filter remaining artifacts using logarithmic entropy.Our evaluation demonstrates that our system can identify malicious artifacts with high accuracy and that its double-checking method is more efficient than alternative approaches.Our system can significantly reduce the time required for forensic analysis and serve as a reference for future studies. 展开更多
关键词 Digital forensics autoencoder logarithmic entropy PRIORITIZATION anomaly detection windows artifacts artificial intelligence
在线阅读 下载PDF
Vehicle routing optimization algorithm based on time windows and dynamic demand
14
作者 LI Jun DUAN Yurong +1 位作者 ZHANG Weiwei ZHU Liyuan 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2024年第3期369-378,共10页
To provide the supplier with the minimizum vehicle travel distance in the distribution process of goods in three situations of new customer demand,customer cancellation service,and change of customer delivery address,... To provide the supplier with the minimizum vehicle travel distance in the distribution process of goods in three situations of new customer demand,customer cancellation service,and change of customer delivery address,based on the ideas of pre-optimization and real-time optimization,a two-stage planning model of dynamic demand based vehicle routing problem with time windows was established.At the pre-optimization stage,an improved genetic algorithm was used to obtain the pre-optimized distribution route,a large-scale neighborhood search method was integrated into the mutation operation to improve the local optimization performance of the genetic algorithm,and a variety of operators were introduced to expand the search space of neighborhood solutions;At the real-time optimization stage,a periodic optimization strategy was adopted to transform a complex dynamic problem into several static problems,and four neighborhood search operators were used to quickly adjust the route.Two different scale examples were designed for experiments.It is proved that the algorithm can plan the better route,and adjust the distribution route in time under the real-time constraints.Therefore,the proposed algorithm can provide theoretical guidance for suppliers to solve the dynamic demand based vehicle routing problem. 展开更多
关键词 vehicle routing problem dynamic demand genetic algorithm large-scale neighborhood search time windows
在线阅读 下载PDF
基于Windows和Linux操作系统基线核查及加固技术的研究和应用
15
作者 吴英松 赵亮 隋明岐 《电脑知识与技术》 2024年第28期72-74,共3页
文章对Windows和Linux操作系统基线核查加固技术进行研究。针对电力系统主机存在的安全缺陷,从主机信息、账户及口令、主机配置、服务及应用以及日志及审计等五个大类着手,给出自动化基线核查与加固工具的总体开发架构与模块设计,重点阐... 文章对Windows和Linux操作系统基线核查加固技术进行研究。针对电力系统主机存在的安全缺陷,从主机信息、账户及口令、主机配置、服务及应用以及日志及审计等五个大类着手,给出自动化基线核查与加固工具的总体开发架构与模块设计,重点阐述2种操作系统基线安全与加固以及数据分析等核心功能的开发流程,经测试证明了该工具的可用性和健壮性。 展开更多
关键词 LINUX windows 基线核查 基线加固 数据分析
在线阅读 下载PDF
高职Windows系统管理课程思政教学实践探索
16
作者 马洪雷 何首武 李晓英 《电脑知识与技术》 2024年第35期154-156,共3页
将课程思政融入高职计算机网络专业的专业课教学过程中,是实现立德树人根本任务的基本要求。文章以Win⁃dows系统管理这一计算机网络专业课为例,以知识、能力、素养为主线,根据课程特点明确教学目标,分析课程内容挖掘思政元素,依据思政... 将课程思政融入高职计算机网络专业的专业课教学过程中,是实现立德树人根本任务的基本要求。文章以Win⁃dows系统管理这一计算机网络专业课为例,以知识、能力、素养为主线,根据课程特点明确教学目标,分析课程内容挖掘思政元素,依据思政元素匹配思政案例,最后采用合适的教学方法实现教学目标。通过重新梳理教学内容,设计了基于技能提升的模块化教学实践方案。教学实践效果显示,新的教学实践方案显著提升了学生的学习热情,塑造了学生的职业技能观、团队协作能力和专业专注的工程师品格,为学生从事网络管理和设计打下良好的基础。同时,该课程的研究成果对于其他计算机网络专业课,课程思政的构建具有一定的参考价值。 展开更多
关键词 课程思政 windows系统管理 模块化教学 实践方案
在线阅读 下载PDF
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
17
作者 Islam Zada Mohammed Naif Alatawi +4 位作者 Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi 《Computers, Materials & Continua》 SCIE EI 2024年第8期2917-2939,共23页
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malwar... Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention mechanisms.Supervised machine learning classifiers have emerged as promising tools for malware detection.However,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection.Addressing this gap can provide valuable insights for enhancing cybersecurity strategies.While numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware detection.Understanding the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security measures.This study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows systems.The objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows malware.Evaluating the accuracy,efficiency,and suitability of each classifier for real-world malware detection scenarios.Identifying the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and researchers.Offering recommendations for selecting the most effective classifier for Windows malware detection based on empirical evidence.The study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and evaluation.Exploratory data analysis involves understanding the dataset’s characteristics and identifying preprocessing requirements.Data preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for training.Model training utilizes various supervised classifiers,and their performance is evaluated using metrics such as accuracy,precision,recall,and F1 score.The study’s outcomes comprise a comparative analysis of supervised machine learning classifiers for Windows malware detection.Results reveal the effectiveness and efficiency of each classifier in detecting different types of malware.Additionally,insights into their strengths and limitations provide practical guidance for enhancing cybersecurity defenses.Overall,this research contributes to advancing malware detection techniques and bolstering the security posture of Windows systems against evolving cyber threats. 展开更多
关键词 Security and privacy challenges in the context of requirements engineering supervisedmachine learning malware detection windows systems comparative analysis Gaussian Naive Bayes K Nearest Neighbors Stochastic Gradient Descent Classifier Decision Tree
在线阅读 下载PDF
快速拓展Windows实时性!史上最小的PLC运动控制器发布
18
《智慧工厂》 2024年第1期26-26,共1页
为了解决Windows系统下可视化界面友好、软件开发容易、兼容性好,但无法实现实时性控制;其它带有实时控制功能的系统存在软件平台搭建困难、开发难度高、兼容性差等问题。立迈胜研发了一种NIMC301-A微型运动控制器,可以做到开箱即用,极... 为了解决Windows系统下可视化界面友好、软件开发容易、兼容性好,但无法实现实时性控制;其它带有实时控制功能的系统存在软件平台搭建困难、开发难度高、兼容性差等问题。立迈胜研发了一种NIMC301-A微型运动控制器,可以做到开箱即用,极大地增加了用户的易用性。其自带CANopen主站,具备PLC控制功能,也可为WindoWs平台提供实时性拓展,而体积仅相当于“U盘”大小! 展开更多
关键词 windows系统 可视化界面 软件开发 实时性控制 易用性 运动控制器 U盘 兼容性
在线阅读 下载PDF
畅玩3A、能装Windows和Linux!国产处理器KX-7000测评来了
19
《计算机应用文摘》 2024年第21期196-197,共2页
近日,有第三方媒体发布了关于兆芯KX-7000的评测视频,认为KX-7000不仅是目前桌面端最强的国产处理器之一,对于普通用户来说,也是最易上手的一款国产CPU。KX-7000是兆芯最新一代的国产X86处理器,部分海外网站媒体(如PC Watch)对其进行了... 近日,有第三方媒体发布了关于兆芯KX-7000的评测视频,认为KX-7000不仅是目前桌面端最强的国产处理器之一,对于普通用户来说,也是最易上手的一款国产CPU。KX-7000是兆芯最新一代的国产X86处理器,部分海外网站媒体(如PC Watch)对其进行了性能测试并发布了结果。测试内容围绕KX-7000的架构、性能及主流应用方面进行了测试,在介绍了兆芯x86架构来源及特点的同时,展现了KX-7000在Spec2006、视频编解码、3A游戏、主流办公等应用下的数据与体验。具体如下。 展开更多
关键词 国产处理器 LINUX 视频编解码 windows 普通用户 测试内容 性能测试 第三方
在线阅读 下载PDF
Multi-type ant system algorithm for the time dependent vehicle routing problem with time windows 被引量:15
20
作者 DENG Ye ZHU Wanhong +1 位作者 LI Hongwei ZHENG Yonghui 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第3期625-638,共14页
The time dependent vehicle routing problem with time windows(TDVRPTW) is considered. A multi-type ant system(MTAS) algorithm hybridized with the ant colony system(ACS)and the max-min ant system(MMAS) algorithm... The time dependent vehicle routing problem with time windows(TDVRPTW) is considered. A multi-type ant system(MTAS) algorithm hybridized with the ant colony system(ACS)and the max-min ant system(MMAS) algorithms is proposed. This combination absorbs the merits of the two algorithms in solutions construction and optimization separately. In order to improve the efficiency of the insertion procedure, a nearest neighbor selection(NNS) mechanism, an insertion local search procedure and a local optimization procedure are specified in detail. And in order to find a balance between good scouting performance and fast convergence rate, an adaptive pheromone updating strategy is proposed in the MTAS. Computational results confirm the MTAS algorithm's good performance with all these strategies on classic vehicle routing problem with time windows(VRPTW) benchmark instances and the TDVRPTW instances, and some better results especially for the number of vehicles and travel times of the best solutions are obtained in comparison with the previous research. 展开更多
关键词 multi-type ant system(MTAS) time dependent vehicle routing problem with time windows(vrptw) nearest neighbor selection(NNS)
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部