首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   51篇
  免费   4篇
  国内免费   5篇
电工技术   2篇
综合类   1篇
金属工艺   1篇
机械仪表   1篇
建筑科学   7篇
无线电   1篇
一般工业技术   1篇
自动化技术   46篇
  2022年   1篇
  2021年   1篇
  2020年   2篇
  2015年   1篇
  2014年   5篇
  2013年   3篇
  2011年   4篇
  2010年   6篇
  2009年   3篇
  2008年   7篇
  2007年   10篇
  2006年   4篇
  2005年   5篇
  2004年   1篇
  2003年   2篇
  2002年   2篇
  2001年   1篇
  2000年   1篇
  1990年   1篇
排序方式: 共有60条查询结果,搜索用时 0 毫秒
21.
22.
制造业柔性化的趋势使得分布式控制系统得以迅速发展,多节点控制软件的重要性日益突出。提出了一种将动作时序与人机交互界面编程分离的方法:利用文本语言描述动作时序图,对其进行编辑、解释,生成独立于界面的后台动作执行程序。利用LabVIEW软件的VI Scripting功能,通过实例验证该编程方法是可行的。  相似文献   
23.
利用可重用性的组件或对象,重新构建新应用程序,能明显提高程序开发效率和改善程序质量。本文首先介绍了基于组件的ActiveX Scripting的技术框架,分析了框架中各组件的功能,并在此基础上给出了利用这些可重用的组件构建调试器程序的具体实现。  相似文献   
24.
朱思猛  杜瑞颖  陈晶  何琨 《计算机工程》2022,48(11):120-126
Web应用防火墙(WAF)基于一组规则检测和过滤进出Web应用程序的HTTP流量,鉴于恶意流量的复杂性,需要对WAF规则进行不断更新以抵御最新的攻击。然而,现有的WAF规则更新方法都需要专业知识来人工设计关于某种攻击的恶意测试流量,并针对该恶意流量生成防护规则,这种方法十分耗时且不能扩展到其他类型的攻击。提出一种基于循环神经网络(RNN)的Web应用防火墙加固方案,在不依赖任何专业知识的情况下自动化加固WAF。使用RNN模型生成恶意攻击样本,从中找到能够绕过WAF的恶意攻击,发现WAF规则存在的安全风险。在此基础上,通过设计评分函数找到恶意攻击样本的重要字符串来生成加固签名,阻止后续类似的攻击,并设计简化的正则表达式作为加固签名的表达形式。在4款WAF上针对SQL注入、跨站脚本攻击和命令注入这3种攻击进行测试,结果显示,该方案成功生成了大量绕过WAF的恶意样本,WAF针对这些样本的平均拦截率仅为52%,与传统突变方案和SQLMap工具相比能够生成更多绕过恶意攻击,在应用加固签名后,WAF的恶意攻击拦截率提升至90%以上且误报率维持为0,表明加固签名成功阻止了这些绕过攻击,验证了所提方案...  相似文献   
25.
An object-oriented architecture for a computer animation system   总被引:1,自引:1,他引:0  
This paper describes the architecture, capabilities and implementation of The Clockworks, an object-oriented computer animation system encompassing a wide variety of modeling, image synthesis, animation, programming and simulation capabilities in a single integrated environment. The object-oriented features of The Clockworks are implemented in portable C under UNIX using a programming discipline. These features include objects with methods and instance variables, class hierarchies, inheritance, instantiation and message passing.  相似文献   
26.
The development of service robots has gained more attention over the last years. Advanced robots have to cope with many different situations emerging at runtime, while executing complex tasks. They should be programmed as dynamically adaptive systems, capable of adapting themselves to the execution environment, including the computing, user, and physical environment. Recently, dynamic languages are becoming widely used because of the high runtime adaptability they offer. Therefore, we have analyzed the suitability of these languages to implement robotic systems with high runtime adaptability requirements, using Python as case study because of its maturity. To evaluate their suitability, we have implemented a reflective robotics framework that can be programmed in both Java and any dynamic language supported by the standard Java Scripting API. An example scenario has been developed using Python to show how its distinguishing meta‐programming features have facilitated the development of runtime‐adaptable robotics services. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
27.
The unprecedented growth in numbers of children playing computer games has stimulated discussion and research regarding what, if any, educational value these games have for teaching and learning. The research on this topic has primarily focused on children as players of computer games rather than builders/constructors of computer games. Recently, several game companies, such as BioWare Corp. and Bethesda Softworks, have released game story creation tools to the public, along with their games. However, a major obstacle to using these commercial tools is the level of programming experience required to create interactive game stories. In this paper, we demonstrate that a commercial game story construction tool, BioWare Corp.’s Aurora Toolset, can be augmented by our new tool, ScriptEase, to enable students in two grade ten English classes to successfully construct interactive game stories. We present evidence that describes the relationship between interactive story authoring and traditional story authoring, along with a series of factors that can potentially affect success at these activities: gender, creativity, intellectual ability, previous experiences with programming, time playing computer games, and time spent online. Results indicate that students can successfully construct sophisticated interactive stories with very little training. The results also show no gender differences in the quality of these interactive stories, regardless of programming experience or the amount of time per week playing computer games or participating in general online activities, although a subset of female students did show a slightly higher level of performance on interactive story authoring. In the educational context of this study, we show that ScriptEase provides an easy-to-use tool for interactive story authoring in a constructionist learning environment.  相似文献   
28.
基于攻击树的脚本病毒样本分析方法*   总被引:5,自引:0,他引:5  
在研究攻击树分析方法和脚本病毒原理的基础上,提出了一种基于攻击树的脚本病毒样本分析方法。结合一个脚本病毒的实例,深层分析病毒的传播、隐藏和破坏行为,进而生成了相应的对策,提高了病毒样本分析的效率,对未知病毒的防治也有积极的意义。  相似文献   
29.
脚本语言可以通过“黏合”构件模块形成新的应用程序。通过分析“和欣”操作系统和CAR构件编程模型对面向构件编程的支持,提出了基于CAR构件系统的脚本语言通用适配层SCI,探讨了一种脚本语言与CAR构件自动适配的技术,以实现基于CAR构件的脚本动态编程。结合CAR构件技术与脚本语言,提高应用程序的模块化程度,加速应用程序的开发过程。  相似文献   
30.
This study investigated whether assigning students summarizing roles in online discussions during specific weeks affects how they attend to the posts of others while playing the role, and in subsequent discussion weeks. Thirty-three students in a large undergraduate course on educational psychology were assigned one of two summarizing roles (Synthesizer, Wrapper) on a rotating basis during six week-long small-group online discussions; demographic and log-file data were collected (N = 198 student-weeks). Multilevel, cross-classification modeling revealed that assigning students summarizing roles increased the breadth of their listening during in-role weeks, but the effect was only weakly sustained after the role was completed. Students taking the Synthesizer role showed some increased depth of listening during in-role weeks but not post-role weeks. Other post-role behavior changes (a reduced number of sessions and review of posts) suggest unintended negative side effects of a role-rotation strategy, possibly due to post-role abdication of responsibility.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号