期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
检测管理信息化软件在实验室管理中的应用现状与改进方向
1
作者 邝婧雯 《广东建材》 2009年第6期213-215,共3页
检测管理信息化软件在工程质量检测行业中起着举足轻重的作用,通过分析当前常用的检测管理信息化软件的应用现状及存在的不足之处。
关键词 建设工程 质量检测 检测管理信息软件 实验室管理 改进
下载PDF
潜入PC大脑的利器——CPU-Z
2
作者 龙果子 《大众硬件》 2003年第4期109-112,共4页
很多初学者在看一些电脑类杂志报刊时常常会为一些CPU专有名词头痛,什么BO内核,缓存互连模式及内部代号等。而对于自己的PC,很多人只是知道个大概,并不十分了解。要了解硬件,我们首先要了解PC的“大脑”,也就是CPU。大家常常在一些专业... 很多初学者在看一些电脑类杂志报刊时常常会为一些CPU专有名词头痛,什么BO内核,缓存互连模式及内部代号等。而对于自己的PC,很多人只是知道个大概,并不十分了解。要了解硬件,我们首先要了解PC的“大脑”,也就是CPU。大家常常在一些专业媒体的测试文章中看到在CPU的相关信息检测中会用到一个叫WCPUID的软件,这个软件的功能十分强大,可查信息广泛。不过这里给大家介绍的是另一款非常小巧的软件,它叫做CPU-Z,最新的版本为1.16,我们可以从驱动之家下载,下载地址:ftp://file 2.mydrivers.com/tools/cpu/cpu-z-116.zip。 对于初学者来说笔者认为这是更直观的一个软件,下面将对比WCPUID来进行对比讲解。 展开更多
关键词 CPU 信息检测软件 CPU-Z 使用方法
下载PDF
了解你的电脑配置
3
作者 黄历闽 《网迷》 2003年第4期18-20,共3页
关键词 硬件信息检测软件 AIDA32 CPU 主板 电脑配置
下载PDF
Using Sobel Operator for Automatic Edge Detection in Medical Images 被引量:3
4
作者 A.V. Doronicheva A. A. Socolov S. Z. Savin 《Journal of Mathematics and System Science》 2014年第4期257-260,共4页
The problems of installation and integration of complex suite of software for processing medical images. Based analysis of the situation is realized in an easier integration of an automated system using the latest inf... The problems of installation and integration of complex suite of software for processing medical images. Based analysis of the situation is realized in an easier integration of an automated system using the latest information technologies using the web - environment for analysis and segmentation of DICOM - images. 展开更多
关键词 SEGMENTATION medical image the algorithm contouring the Ring Road the quality of medical images
下载PDF
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
5
作者 Jin Li Jinfu Chen +5 位作者 Minhuan Huang Minmin Zhou Wanggen Xie Zhifeng Zeng Shujie Chen Zufa Zhang 《China Communications》 SCIE CSCD 2018年第2期190-208,共19页
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid devel... Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively de- tect the software vulnerabilities in the security maintenance of information systems. In this paper, we firstly studied some of the common- ly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of eval- uation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Final- ly, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guid- ance to aid the selection of the most appropri- ate and effective method or tools in vulnera- bility detection activity. 展开更多
关键词 software vulnerability detection LOOPHOLES information security evaluationmethod testing framework
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部