期刊文献+

高速铁路车载设备记录的图形化分析平台 被引量:3

Platform for Graphics Analysis of Records on Vehicle Mounted Equipment of High-speed Railway
下载PDF
导出
摘要 根据实际应用,设计一个高速铁路车载设备记录的图形化分析平台。该平台重点研究图形化分析的设计思想、图形化算法以及数据安全性,同时将"所见即所得"视窗概念应用于图形化界面中。平台不但能提供详细的文本信息,而且将数据以图形化进行展现、检索及仿真。此平台已应用于CTCS2级车载设备运行记录文件的分析,可推广到其它等级。 A platform for graphics analysis of records on vehicle mounted equipment of high-speed railway is designed on the basis of practical application.The platform focuses on design of graphics analysis,graphics arithmetic,graphics definition and data safety,also applies "what you see is what you get" Windows concept to graphics analysis.The platform not only provides detailed text message,but presents data with graphics for retrieving and imitation.The platform has been applied to analysis of records on vehicle mounted equipment of CTCS2-200 C,and it is expected to expand to equipment of other grades.
出处 《高速铁路技术》 2011年第3期24-28,共5页 High Speed Railway Technology
关键词 铁路 图形化分析 平台 railway graphics analysis platform
  • 相关文献

参考文献3

二级参考文献25

  • 1吴金波,蒋烈辉.反静态反汇编技术研究[J].计算机应用,2005,25(3):623-625. 被引量:5
  • 2BENJAMIN S,DEBRAY S,GREGORY A. Disassembly of executable code revisited[ C]//Proc of the 9th Working Conference on Reverse Engineering. Washington DC:IEEE Computer Society, 2002:45.
  • 3CIFUENTES C, GOUGH K J. Decompilation of binary programs[ J]. Software-Practice and Experience,1995,25(7) :811-829.
  • 4HSIEH W C, ENGLER D, BACK G. Reverse-engineering instruction encodings [ C ]//Proc of USENIX Annual Technical Conference. Berkeley : USENIX Association,2001 : 133- 145.
  • 5CIFUENTES C, FRABOULET A. Intraprocedural static slicing of binary executables [ C ]//Proc of International Conference on Software Maintenance. Washington DC:IEEE Computer Society,1997:188.
  • 6WILLIAM F Z. Concepts and techniques in software watermarking and obfuscation [ D ]. New Zealand: The University of Auckland, 2007.
  • 7BARAK B,GOLDREICH O,IMPAGLIAZZO R, et al. On the (Im) possibility of obfuscating programs [ C ]//Proc of the 21st Annual International Cryptology Conference, California. London : Springer-Verlag, 2001:1- 18.
  • 8LINN C, DEBRAR S. Obfuscation of executable code to imporve resistance to static disassembly[ C ]//Proc of the 10th ACM Conference on Computer and Communications Security. New York : ACM Press, 2003:290- 299.
  • 9ZHANG Xue-song, HE Feng-ling, ZUO Wan-li. An inter-classes obfuscation method for Java program [ C ]//Proc of the 2nd International Conference on Information Security and Assurance. Washington DC: IEEE Computer Society, 2008:360- 365.
  • 10PIETREK M. Peering inside the PE : a tour of the Win32 portable executable file format[ CD]. [ S. l. ] :Microsoft MSDN Library, 1994.

共引文献11

同被引文献14

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部