期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
STM32控制器烧录工具读写option bytes的实现 被引量:1
1
作者 陈景郁 朱洪雷 《机电技术》 2019年第6期30-32,共3页
随着物联网的发展,嵌入式智能设备对微型控制器的需求越来越高。意法半导体(ST)公司推出的STM23系列控制器,性价比高,稳定性好,是比较常见的选择。option bytes是STM32系列控制器中特有的字节选项,可以对系统功能进行特殊的个性化配置... 随着物联网的发展,嵌入式智能设备对微型控制器的需求越来越高。意法半导体(ST)公司推出的STM23系列控制器,性价比高,稳定性好,是比较常见的选择。option bytes是STM32系列控制器中特有的字节选项,可以对系统功能进行特殊的个性化配置。在产品生产过程中,随着芯片固件烧录后,option bytes也需要在出厂前完成配置。文中介绍了一种方法,改造STM32烧录器工具pystlink,实现了对option bytes的读写功能,应用到产品量产中,简单易操作。 展开更多
关键词 STM32控制器 烧录工具 option bytes pystlink
下载PDF
Chinese Scripts:From Oracle Bones to Computer Bytes
2
《China & The World Cultural Exchange》 2002年第6期30-31,共2页
Last August, a well-prepared exhibition titled "Chinese Scripts: From Oracle Bones to Computer Bytes" opened in Beijing-based Chinese Modern Literature Museum. This exhibition toured Egypt last October as a ... Last August, a well-prepared exhibition titled "Chinese Scripts: From Oracle Bones to Computer Bytes" opened in Beijing-based Chinese Modern Literature Museum. This exhibition toured Egypt last October as a cultural event in celebration of the opening of China Cultural Center in Egypt. After that, it will be displayed in France, Malta and the Republic of Korea. 展开更多
关键词 ORACLE In Chinese Scripts:From Oracle Bones to Computer bytes
下载PDF
Modeling and Implementation of a Data Security and Protection Medium Using the Generated Key Based on Electromagnetic Wave Propagation Theories
3
作者 Vincent Mbonigaba Fulgence Nahayo +3 位作者 Octave Moutsinga Dieudonné Okalas-Ossami Romeo Nibitanga Thérence Niyonsaba 《Journal of Computer and Communications》 2024年第9期131-140,共10页
Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide ... Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide a security service and protect the privacy of users by providing protection against attacks such as identity theft, denial of service, eavesdropping and unauthorised access to personal and sensitive data. It is therefore necessary to find a robust method of using the key that is effective in protecting and preventing data tampering. In this paper, we design and implement a security and data protection method using a key generated on the basis of electromagnetic wave propagation theories. Modelling and implementation of a data security and protection method using a key generated on the basis of electromagnetic wave propagation theories. 展开更多
关键词 MODELING Security CRYPTOGRAPHY Algorithm CODING Quantum Post bytes System WAVES
下载PDF
一种Byte查找第K个元素的算法研究 被引量:1
4
作者 班志杰 高光来 闫晓东 《内蒙古大学学报(自然科学版)》 CAS CSCD 北大核心 2004年第3期322-324,共3页
查找第K个元素的问题在计算机查找技术中占有十分重要的地位,这个问题的最直接解法是先将序列排序,从而能得到第K个元素,最少需O(nlogn)次比较,即时间复杂度为O(nlogn).比较好的方法是采用分治策略解决该问题,但其最坏时间复杂度为O(n2)... 查找第K个元素的问题在计算机查找技术中占有十分重要的地位,这个问题的最直接解法是先将序列排序,从而能得到第K个元素,最少需O(nlogn)次比较,即时间复杂度为O(nlogn).比较好的方法是采用分治策略解决该问题,但其最坏时间复杂度为O(n2),平均时间复杂度为O(2n)〔1〕.本文提出一种Byte解决第K个元素问题的算法,该算法的平均时间复杂度为O(n+n/255),优于以前对该问题的求解方法〔1〕,而且该算法可以适用于由整数、浮点数、无符号整型数、双精度数和字符型数构成的超大数集. 展开更多
关键词 Byte查找第K个元素的算法 平均时间复杂度 算法
下载PDF
简谈VB中用数据库存取图片的简便方法 被引量:2
5
作者 李利平 《计算机教育》 2010年第8期125-128,共4页
VB数据库中图像数据的存取对初学者来说是个难点,文章总结了绑定图片控件、存储图片文件路径、利用PropertyBag对象与Byte数组中转三种较为简便的方法以供初学者参考。
关键词 VB DATA控件 数据库 图片 存取 路径 PropertyBag Byte数组
下载PDF
互联网4byte自治域标识过渡研究
6
作者 陆俊秀 朱韵成 陈茂科 《电信科学》 北大核心 2008年第3期65-68,共4页
互联网将逐渐向4byte的自治域号码过渡。过渡过程中,新、旧两种路由器的互操作性成为网络运营商十分关注的问题。本文就过渡过程对路由收敛性和路由策略的影响进行了深入的分析,并通过试验床进行了验证。针对这些影响,本文提出了相应的... 互联网将逐渐向4byte的自治域号码过渡。过渡过程中,新、旧两种路由器的互操作性成为网络运营商十分关注的问题。本文就过渡过程对路由收敛性和路由策略的影响进行了深入的分析,并通过试验床进行了验证。针对这些影响,本文提出了相应的应对措施。此外,针对4byte自治域号码路由,作者设计的故障排查服务系统,能够方便系统管理员对路由故障进行排查和诊断。 展开更多
关键词 4byte自治域号码 过渡 路由收敛性 路由策略 故障诊断
下载PDF
中文报文Byte级列换位
7
作者 游荣彦 《华南师范大学学报(自然科学版)》 CAS 1997年第2期32-36,共5页
本文给出中文报文Byte级列换位的算法,显示了该算法具有C.Shannon所指的扩散与混乱的能力。
关键词 加密算法 计算机密码学 中文报文 Byte级列换位
下载PDF
Improved image captioning with subword units training and transformer 被引量:1
8
作者 Cai Qiang Li Jing +1 位作者 Li Haisheng Zuo Min 《High Technology Letters》 EI CAS 2020年第2期211-216,共6页
Image captioning models typically operate with a fixed vocabulary,but captioning is an open-vocabulary problem.Existing work addresses the image captioning of out-of-vocabulary words by labeling it as unknown in a dic... Image captioning models typically operate with a fixed vocabulary,but captioning is an open-vocabulary problem.Existing work addresses the image captioning of out-of-vocabulary words by labeling it as unknown in a dictionary.In addition,recurrent neural network(RNN)and its variants used in the caption task have become a bottleneck for their generation quality and training time cost.To address these 2 essential problems,a simpler but more effective approach is proposed for generating open-vocabulary caption,long short-term memory(LSTM)unit is replaced with transformer as decoder for better caption quality and less training time.The effectiveness of different word segmentation vocabulary and generation improvement of transformer over LSTM is discussed and it is proved that the improved models achieve state-of-the-art performance for the MSCOCO2014 image captioning tasks over a back-off dictionary baseline model. 展开更多
关键词 image captioning transformer BYTE PAIR encoding(BPE) REINFORCEMENT learning
下载PDF
VB中资源文件的创建及使用 被引量:2
9
作者 罗祥远 《湖南工业职业技术学院学报》 2001年第2期12-14,共3页
在发布 V B应用程序时 ,我们往往对一些不是程序本身但又必须要的一些文件的存放位置感到麻烦 ,或者在制作双语言(比如中英文 )版本程序时感到不方便。本文详细介绍了资源文件的创建方法和使用技巧 。
关键词 资源文件 工程文件 存储器 Byte数组 VB应用程序 创建方法 使用技巧
下载PDF
巧用VB的Byte型变量实现与单片机通讯 被引量:3
10
作者 陈海云 《微计算机信息》 2000年第1期21-22,共2页
本文分析Visual BASIC串行通讯控件的特点,提出利用 AscB()函数和Byte型变量处理通讯数据,消除了使用String型变量只能处理 ASCII码为 00H— 7FH的文本字符的缺陷,真正实现Windows环... 本文分析Visual BASIC串行通讯控件的特点,提出利用 AscB()函数和Byte型变量处理通讯数据,消除了使用String型变量只能处理 ASCII码为 00H— 7FH的文本字符的缺陷,真正实现Windows环境下PC机与单片机的通讯。 展开更多
关键词 PC机 单片机 通讯 VB语言 Byte型变量
下载PDF
多接口显示器EDID快速烧录方法 被引量:1
11
作者 黄玉琴 《福建电脑》 2017年第4期157-158,99,共3页
为实现显示器多接口如VGA、DVI、HDMI等接口的显示器数据EDID数据在线生产过程中达到快速烧录,以节省工时,提高产能。本论文提出一种快速烧录的方法,新的烧录方式是将这128Byte的EDID数据与显示器功能的软体Code结合一起存储在主板的Fla... 为实现显示器多接口如VGA、DVI、HDMI等接口的显示器数据EDID数据在线生产过程中达到快速烧录,以节省工时,提高产能。本论文提出一种快速烧录的方法,新的烧录方式是将这128Byte的EDID数据与显示器功能的软体Code结合一起存储在主板的Flash IC内,然后到生产线上组装后第一次上电时,这128Byte的共用EDID内容会自动烧录到每台显示器上,然后线上的人员只需烧录实时变更的生产序列号,周别等19Byte的EDID数据内容给每台显示器。 展开更多
关键词 EDID 19Byte 多接口 快速烧录 生产序列号
下载PDF
Performance improvement of software component with partial evaluation
12
作者 毛宏燕 黄林鹏 李明禄 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第1期95-99,共5页
To avoid the complexity and inefficiency for specific applications of the current software architecture, a novel approach using partial evaluation is proposed to improve the running performance of components. The gene... To avoid the complexity and inefficiency for specific applications of the current software architecture, a novel approach using partial evaluation is proposed to improve the running performance of components. The generic program was specialized into domain-specific realization for the known knowledge and environments. The syntax and semantic(adj.) were analyzed based on byte code instruction sequences, and partial evaluation rules depicted how to perform the specialization. The partial evaluation for object-oriented programs was implemented. The experimental results show that partial evaluation is effective to speed up the running efficiency. The more generality and scalability can be obtained by the integration of partial evaluation with the favorable design mechanisms and compiler optimization technology. 展开更多
关键词 partial evaluation running efficiency COMPONENT byte code instruction sequence
下载PDF
Byte-Level Function-Associated Method for Malware Detection
13
作者 Jingwei Hao Senlin Luo Limin Pan 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期719-734,共16页
The byte stream is widely used in malware detection due to its independence of reverse engineering.However,existing methods based on the byte stream implement an indiscriminate feature extraction strategy,which ignore... The byte stream is widely used in malware detection due to its independence of reverse engineering.However,existing methods based on the byte stream implement an indiscriminate feature extraction strategy,which ignores the byte function difference in different segments and fails to achieve targeted feature extraction for various byte semantic representation modes,resulting in byte semantic confusion.To address this issue,an enhanced adversarial byte function associated method for malware backdoor attack is proposed in this paper by categorizing various function bytes into three functions involving structure,code,and data.The Minhash algorithm,grayscale mapping,and state transition probability statistics are then used to capture byte semantics from the perspectives of text signature,spatial structure,and statistical aspects,respectively,to increase the accuracy of byte semantic representation.Finally,the three-channel malware feature image is constructed based on different function byte semantics,and a convolutional neural network is applied for detection.Experiments on multiple data sets from 2018 to 2021 show that the method can effectively combine byte functions to achieve targeted feature extraction,avoid byte semantic confusion,and improve the accuracy of malware detection. 展开更多
关键词 Byte function malware backdoor attack semantic representation model visualization
下载PDF
万物有色
14
作者 马迪 《今日中国》 2021年第11期76-76,共1页
就像每一个装修新手一样,我在面对着厚厚一打墙漆色卡的时候才意识到:我们身边居然有这么多种色彩可供选择,而且每一种都有自己的名字……事实上,自然界中颜色有无数种,即使在有限的电子世界中,红绿蓝三基色各用1个BYTE(字节,范围是0-2... 就像每一个装修新手一样,我在面对着厚厚一打墙漆色卡的时候才意识到:我们身边居然有这么多种色彩可供选择,而且每一种都有自己的名字……事实上,自然界中颜色有无数种,即使在有限的电子世界中,红绿蓝三基色各用1个BYTE(字节,范围是0-255)来表示,也有16777216种颜色之多。作为一种“好色”的视觉动物,从光照进眼睛的那一刻起。 展开更多
关键词 色卡 红绿蓝三基色 BYTE
下载PDF
联合Transformer与BYTE数据关联的多目标实时跟踪算法 被引量:3
15
作者 潘昊 刘翔 +1 位作者 赵静文 张星 《激光与光电子学进展》 CSCD 北大核心 2023年第6期144-151,共8页
针对复杂环境下多目标跟踪过程出现的轨迹漏检、误检及身份切换等问题,提出一种基于改进YOLOX和BYTE数据关联方法的多目标跟踪算法.首先,为了增强YOLOX在复杂环境下的目标检测能力,将YOLOX骨干网络与Vision Transformer结合,增强网络的... 针对复杂环境下多目标跟踪过程出现的轨迹漏检、误检及身份切换等问题,提出一种基于改进YOLOX和BYTE数据关联方法的多目标跟踪算法.首先,为了增强YOLOX在复杂环境下的目标检测能力,将YOLOX骨干网络与Vision Transformer结合,增强网络的局部特征提取能力,同时加入α-GIoU损失函数,进一步增加网络边界框的回归精度;其次,为了满足算法实时性要求,采用BYTE数据关联方法,摒弃传统特征重识别(Re-ID)网络,进一步提高了多目标跟踪算法的速度;最后,为了改善光照、遮挡等复杂环境下的跟踪问题,采用更加适应非线性系统的扩展卡尔曼滤波,提高了网络在复杂场景下对跟踪轨迹的预测精度.实验结果表明:所提算法对MOT17数据集的multiple object tracking accuracy(MOTA)、identity F1-measure(IDF1)指标分别为73.0%、70.2%,相较于目前最优的ByteTrack,分别提升了 1.3个百分点、2.1个百分点,number of identity switches(IDSW)则减少了 3.7%;同时所提算法取得了 51.2 frame/s的跟踪速度,满足系统实时性要求. 展开更多
关键词 多目标跟踪 YOLOX BYTE TRANSFORMER 复杂场景
原文传递
Chaos block cipher for wireless sensor network 被引量:6
16
作者 CHEN Shuai ZHONG XianXin WU ZhengZhong 《Science in China(Series F)》 2008年第8期1055-1063,共9页
New block cipher algorithm in single byte for wireless sensor network with excellence of many cipher algorithms is studied. The child keys are generated through the developed discrete Logistic mapping, and the Feistel... New block cipher algorithm in single byte for wireless sensor network with excellence of many cipher algorithms is studied. The child keys are generated through the developed discrete Logistic mapping, and the Feistel encrypting function with discrete chaos operation is constructed. The single byte block is encrypted and decrypted through one turn permutation, being divided into two semi-byte, quadri- Feistel structural operation, and one turn permutation again. The amount of keys may be variable with the turns of Feistel structural operation. The random and security of the child key was proven, and the experiment for the block cipher in wireless sensor network was completed. The result indicates that the algorithm is more secure and the chaos block cipher in single byte is feasible for wireless sensor network. 展开更多
关键词 block cipher wireless sensor network discrete chaos encryption function single byte
原文传递
Method of data cleaning for network traffic classification 被引量:1
17
作者 WANG Ruo-yu LIU Zhen ZHANG Ling 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第3期35-45,共11页
Network traffic classification aims at identifying the application types of network packets. It is important for Internet service providers (ISPs) to manage bandwidth resources and ensure the quality of service for ... Network traffic classification aims at identifying the application types of network packets. It is important for Internet service providers (ISPs) to manage bandwidth resources and ensure the quality of service for different network applications However, most classification techniques using machine learning only focus on high flow accuracy and ignore byte accuracy. The classifier would obtain low classification performance for elephant flows as the imbalance between elephant flows and mice flows on Internet. The elephant flows, however, consume much more bandwidth than mice flows. When the classifier is deployed for traffic policing, the network management system cannot penalize elephant flows and avoid network congestion effectively. This article explores the factors related to low byte accuracy, and secondly, it presents a new traffic classification method to improve byte accuracy at the aid of data cleaning. Experiments are carried out on three groups of real-world traffic datasets, and the method is compared with existing work on the performance of improving byte accuracy. Experiment shows that byte accuracy increased by about 22.31% on average. The method outperforms the existing one in most cases. 展开更多
关键词 network traffic classification byte accuracy elephant flow mice flow machine learning
原文传递
Performance Analysis of Two Ethernet over E1 Schemes
18
作者 陈文涛 金德鹏 曾烈光 《Tsinghua Science and Technology》 SCIE EI CAS 2007年第1期70-76,共7页
The Ethernet over E1 approach, which takes advantage of widely deployed telecom networks, is an efficient and economical way to interconnect two Ethernets in different regions. Two Ethemet over E1 schemes, namely a by... The Ethernet over E1 approach, which takes advantage of widely deployed telecom networks, is an efficient and economical way to interconnect two Ethernets in different regions. Two Ethemet over E1 schemes, namely a byte granularity scheme and a frame granularity scheme are discussed. The byte granularity scheme partitions Ethernet frames into several pieces for transmission and has a strict requirement on the maximum delay difference of multiple E1 links. To solve this problem, the newly proposed frame granularity scheme transmits separately each frame through E1 links without any partitioning. The architecture designs of both schemes are presented. This paper evaluates the throughput and delay performances of both schemes, both analytically from results calculated from delay models and using test results from field programmable gate array (FPGA) implementation. Although the frame granularity scheme has a slightly worse delay performance, it has a higher throughput, and is the only choice able to overcome large delay differences of the E1 links. 展开更多
关键词 Ethernet over El byte granularity frame granularity generic frame procedure (GFP) throughput delay
原文传递
VoIP transmission mechanism based on TCP
19
作者 Shuang Kai Guan Zhe Meng Chunzhi 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第6期90-96,共7页
As the widespread employment of firewalls on the Internet, user datagram protocol(UDP) based voice over Internet protocol(Vo IP) system will be unable to transmit voice data. This paper proposed a novel method to ... As the widespread employment of firewalls on the Internet, user datagram protocol(UDP) based voice over Internet protocol(Vo IP) system will be unable to transmit voice data. This paper proposed a novel method to transmit voice data based on transmission control protocol(TCP). The method adopts a disorder TCP transmission strategy, which allows discontinuous data packets in TCP queues read by application layer directly without waiting for the retransmission of lost data packets. A byte stream data boundary identification algorithm based on consistent overhead byte stuffing algorithm is designed to efficiently identify complete voice data packets from disordered TCP packets arrived so as to transmit the data to the audio processing module timely. Then, by implementing the prototype system and testing, we verified that the proposed algorithm can solve the high time delay, jitter and discontinuity problems in standard TCP protocol when transmitting voice data packets, which caused by its error control and retransmission mechanism. We proved that the method proposed in this paper is effective and practical. 展开更多
关键词 voice transmission bypass firewall disorder TCP transmission byte date stream boundary identification
原文传递
谈电视技术中的“8bit”
20
作者 钟俊 《电视指南》 2017年第17期3-4,共2页
'8bit'在现代信息及视频领域都常常出现,它在不同的环境出现有不同的含义。文章通过对这个概念在计量单位、量化深度和位深度三个方面的解释分析,对'8bit'的含义和概念做了深入浅出的解释。也通过静态图片与动态视频在... '8bit'在现代信息及视频领域都常常出现,它在不同的环境出现有不同的含义。文章通过对这个概念在计量单位、量化深度和位深度三个方面的解释分析,对'8bit'的含义和概念做了深入浅出的解释。也通过静态图片与动态视频在码率上的计算关系分析了视频与图片在计算数据量和码率上的区别,并简要解释了视频行、场辅助数据区的概念。 展开更多
关键词 8bit BYTE 量化深度 位深度
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部