首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
作为信息技术的典型代表,计算机技术应用阶段同样面临着各种问题,阻碍了网络运行的安全可靠性。病毒是破坏计算机及其网络性能的常见因素,造成计算机病毒形成的因素复杂多样,其根本原因是由于计算机系统存在的漏洞,往往为恶意攻击者的入侵创造了条件。文章在此背景下介绍了计算机病毒的特点,提出了计算机病毒的防范技术,检测和清除病毒技术的应用,希望对后续研究有所帮助。  相似文献   

2.
计算机的单体运行与计算机的网络运行,都要面临计算机病毒的危害。如何提高计算机对计算机病毒的免疫性,首先要了解计算机病毒的起源和它的工作原理,其次是对计算机病毒的传播方式进行分析,在得出计算机病毒的共性时有针对性的对计算机病毒进行防治。最后是提高操作者的计算机病毒的防范意识,制定出一系列的具体防范制度,并将其真正将防范制度应用到使用中。在杜绝计算机病毒后,让计算机及计算机网络为人类创造出更多的价值。  相似文献   

3.
针对高校公共多媒体教室计算机病毒泛滥的问题,提出了一种基于"网闸"的高校公共多媒体教室计算机管理方案。"网闸"实现了多媒体教室计算机和Internet病毒的隔离,系统补丁及杀毒软件病毒库的实时升级,授课教师自动注册、授课资料快速上传及对资料的病毒防控,多媒体计算机运行状态的实时监控等功能。此方案改变了公共多媒体教室的传统运行模式,基本解决了多媒体教室计算机病毒感染、系统补丁、杀毒软件病毒库升级等问题。给出了此方案的具体实现及其实施过程中相关问题的解决办法。  相似文献   

4.
该文着重介绍了计算机病毒的特征,现状,分析了计算机病毒未来的发展趋势,使人们了解计算机病毒的传播方式和运行机理。  相似文献   

5.
目前,计算机病毒已成为困扰计算机系统安全和网络发展的难题。了解和掌握一些计算机病毒的基本知识,对防范计算机病毒的入侵至关重要。本文通过对计算机病毒的特征、类型和传播途径的介绍,使读者对其有一个概括的认识,并在此基础上提出了一些有效的防范措施,以减少计算机病毒所带来的危害。  相似文献   

6.
计算机网络的建设和发展,对整个社会产生了巨大的推动和冲击同时,也给网络的安全运行带来诸多的挑战。而影响计算机网络系统的安全运行因素主要来自计算机病毒的攻击。因此,研究计算机病毒与防治就显得很有现实意义。本文将从计算机病毒的研究背景、计算机病毒的定义、特征、类型以及防治方面进行简单的分析和探讨。  相似文献   

7.
计算机病毒已成为困扰计算机系统安全和网络发展的重要问题。本文通过对计算机病毒的概念、传播途径的介绍,使人们对篝有一仑理性的认识,在此基础上提出了对计算机病毒攻击的防范的对策和方法。  相似文献   

8.
Autorun文件是Windows操作系统中常见的系统文件,很多计算机病毒都利用这种文件来传播、运行。针对此问题,本文讨论了如何编写程序解决的方法,并利用Delphi给出程序设计实例。  相似文献   

9.
随着计算机及其网络的发展,计算机病毒日益泛滥,防范病毒已成保证计算机及其网络正常运行的必要手段。根据日常学习及实践,从计算机病毒的特点与分类、染毒计算机的症状、计算机病毒的主要传播途径、计算机病毒的防治等方面探讨了防范计算机病毒的措施与方法。  相似文献   

10.
计算机病毒机理及防治   总被引:1,自引:0,他引:1  
本文简要阐述了计算机病毒的概念,特征,重点分析了微机病毒产生的原因和作用机理,在此基础上提出预防和消除计算机病毒的一般方法,并对计算机病毒的发展趋势作了预测。  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

18.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
蒙古语言是中国蒙古族使用的通用语言,由于蒙古文区别于其他文字的书写方式和其自身变形机制等特点,在很多通用的文字处理引擎中都不被支持。在嵌入式产品开发与应用领域中Linux加QTE已经成为流行方式。该文给出了一种在QTE环境上实现基于标准Unicode的蒙古文点阵显示和变形算法, 并自定义了支持蒙古文的QTE组件,扩展了QTE功能,为在Linux加QTE方式的嵌入式体系结构中处理蒙古文提供了一种解决方法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号