期刊文献+
共找到900篇文章
< 1 2 45 >
每页显示 20 50 100
A distributed static model of capacitive MEMS microwave power detection chip
1
作者 Ruifeng Li Debo Wang 《Journal of Semiconductors》 2026年第3期54-64,共11页
To improve the theoretical prediction accuracy of static mechanical quantities in MEMS cantilever beams for microwave power detection chips,a distributed static model is proposed based on the deflection equation.An an... To improve the theoretical prediction accuracy of static mechanical quantities in MEMS cantilever beams for microwave power detection chips,a distributed static model is proposed based on the deflection equation.An analytical frame-work is established through the precise characterization of cantilever beam bending.The framework can accurately extract key electromechanical parameters,and the correlation between these parameters and geometric changes is systematically studied.Results show that the pull-in voltage increases with the gap but decreases with the length.The predicted pull-in voltage indi-cates a relative error of only 6.5%between the distributed static model and the simulation,which is significantly lower than that of the other two models.The overload power and sensitivity are also analyzed to facilitate performance trade-offs in chip design.The measured return loss varies between-66.46 and-10.56 dB over the 8-12 GHz frequency band,exhibiting a charac-teristic V-shaped trend.Moreover,the measured sensitivity of 66.5 fF/W closely matches the theoretical value of 69.3 fF/W,show-ing a relative error of 5.6%.These findings confirm that the distributed model outperforms the other two in terms of both accu-racy and physical realism,thereby providing important reference for the design of microwave power detection chips. 展开更多
关键词 MEMS power detection cantilever beam static model sensitivity
在线阅读 下载PDF
Malware Detection in Smartphones Using Static Detection and Evaluation Model Based on Analytic Hierarchy Process 被引量:1
2
作者 Zhang Miao Yang Youxiu +2 位作者 Cheng Gong Dong Hang Li Chengze 《China Communications》 SCIE CSCD 2012年第12期144-152,共9页
Mobile malware is rapidly increasing and its detection has become a critical issue. In this study, we summarize the common characteristics of this inalicious software on Android platform. We design a detection engine ... Mobile malware is rapidly increasing and its detection has become a critical issue. In this study, we summarize the common characteristics of this inalicious software on Android platform. We design a detection engine consisting of six parts: decompile, grammar parsing, control flow and data flow analysis, safety analysis, and comprehensive evaluation. In the comprehensive evaluation, we obtain a weight vector of 29 evaluation indexes using the analytic hierarchy process. During this process, the detection engine exports a list of suspicious API. On the basis of this list, the evaluation part of the engine performs a compre- hensive evaluation of the hazard assessment of software sample. Finally, hazard classification is given for the software. The false positive rate of our approach for detecting rnalware samples is 4. 7% and normal samples is 7.6%. The experimental results show that the accuracy rate of our approach is almost similar to the method based on virus signatures. Compared with the method based on virus signatures, our approach performs well in detecting unknown malware. This approach is promising for the application of malware detection. 展开更多
关键词 SMARTPHONE MALWARE analytic hierarchy process static detection
在线阅读 下载PDF
Carbon dots derived from Poria cocos polysaccharide as an effective“on-off”fluorescence sensor for chromium(Ⅵ)detection 被引量:6
3
作者 Qianqian Huang Qianqian Bao +4 位作者 Chengyuan Wu Mengru Hu Yunna Chen Lei Wang Weidong Chen 《Journal of Pharmaceutical Analysis》 SCIE CAS CSCD 2022年第1期104-112,共9页
Chromium is a harmful contaminant showing mutagenicity and carcinogenicity.Therefore,detection of chromium requires the development of low-cost and high-sensitivity sensors.Herein,blue-fluorescent carbon quantum dots ... Chromium is a harmful contaminant showing mutagenicity and carcinogenicity.Therefore,detection of chromium requires the development of low-cost and high-sensitivity sensors.Herein,blue-fluorescent carbon quantum dots were synthesized by one-step hydrothermal method from alkali-soluble Poria cocos polysaccharide,which is green source,cheap and easy to obtain,and has no pharmacological activity due to low water solubility.These carbon quantum dots exhibit good fluorescence stability,water solubility,anti-interference and low cytotoxicity,and can be specifically combined with the detection of Cr(Ⅵ)to form a non-fluorescent complex that causes fluorescence quenching,so they can be used as a label-free nanosensor.High-sensitivity detection of Cr(Ⅵ)was achieved through internal filtering and static quenching effects.The fluorescence quenching degree of carbon dots fluorescent probe showed a good linear relationship with Cr(Ⅵ)concentration in the range of 1-100μM.The linear equation was F;/F=0.9942+0.01472[Cr(Ⅵ)](R;=0.9922),and the detection limit can be as low as 0.25μM(S/N=3),which has been successfully applied to Cr(Ⅵ)detection in actual water samples herein. 展开更多
关键词 Carbon dots Alkali-soluble Poria cocos polysaccharide Cr(Ⅵ)detection Internal filtering effect static quenching effect
暂未订购
Web Attack Detection Using the Input Validation Method:DPDA Theory 被引量:3
4
作者 Osamah Ibrahim Khalaf Munsif Sokiyna +2 位作者 Youseef Alotaibi Abdulmajeed Alsufyani Saleh Alghamdi 《Computers, Materials & Continua》 SCIE EI 2021年第9期3167-3184,共18页
A major issue while building web applications is proper input validation and sanitization.Attackers can quickly exploit errors and vulnerabilities that lead to malicious behavior in web application validation operatio... A major issue while building web applications is proper input validation and sanitization.Attackers can quickly exploit errors and vulnerabilities that lead to malicious behavior in web application validation operations.Attackers are rapidly improving their capabilities and technologies and now focus on exploiting vulnerabilities in web applications and compromising confidentiality.Cross-site scripting(XSS)and SQL injection attack(SQLIA)are attacks in which a hacker sends malicious inputs(cheat codes)to confuse a web application,to access or disable the application’s back-end without user awareness.In this paper,we explore the problem of detecting and removing bugs from both client-side and server-side code.A new idea that allows assault detection and prevention using the input validation mechanism is introduced.In addition,the project supports web security tests by providing easy-to-use and accurate models of vulnerability prediction and methods for validation.If these attributes imply a program statement that is vulnerable in an SQLIA,this can be evaluated and checked for a set of static code attributes.Additionally,we provide a script whitelisting interception layer built into the browser’s JavaScript engine,where the SQLIA is eventually detected and the XSS attack resolved using the method of input validation and script whitelisting under pushdown automatons.This framework was tested under a scenario of an SQL attack and XSS.It is demonstrated to offer an extensive improvement over the current framework.The framework’s main ability lies in the decrease of bogus positives.It has been demonstrated utilizing new methodologies,nevertheless giving unique access to sites dependent on the peculiarity score related to web demands.Our proposed input validation framework is shown to identify all anomalies and delivers better execution in contrast with the current program. 展开更多
关键词 static dynamic detection prevention input validation deterministic push down automata
在线阅读 下载PDF
Detection Technique of Software-Induced Rowhammer Attacks 被引量:2
5
作者 Minkyung Lee Jin Kwak 《Computers, Materials & Continua》 SCIE EI 2021年第4期349-367,共19页
Side-channel attacks have recently progressed into software-induced attacks.In particular,a rowhammer attack,which exploits the characteristics of dynamic random access memory(DRAM),can quickly and continuously access... Side-channel attacks have recently progressed into software-induced attacks.In particular,a rowhammer attack,which exploits the characteristics of dynamic random access memory(DRAM),can quickly and continuously access the cells as the cell density of DRAM increases,thereby generating a disturbance error affecting the neighboring cells,resulting in bit flips.Although a rowhammer attack is a highly sophisticated attack in which disturbance errors are deliberately generated into data bits,it has been reported that it can be exploited on various platforms such as mobile devices,web browsers,and virtual machines.Furthermore,there have been studies on bypassing the defense measures of DRAM manufacturers and the like to respond to rowhammer attacks.A rowhammer attack can control user access and compromise the integrity of sensitive data with attacks such as a privilege escalation and an alteration of the encryption keys.In an attempt to mitigate a rowhammer attack,various hardware-and software-based mitigation techniques are being studied,but there are limitations in that the research methods do not detect the rowhammer attack in advance,causing overhead or degradation of the system performance.Therefore,in this study,a rowhammer attack detection technique is proposed by extracting common features of rowhammer attack files through a static analysis of rowhammer attack codes. 展开更多
关键词 Rowhammer attack static analysis detecting technique side-channel attack bit flip
在线阅读 下载PDF
Model for Software Behaviour Detection Based on Process Algebra and System Call 被引量:1
6
作者 申利民 王涛 马川 《China Communications》 SCIE CSCD 2013年第11期24-36,共13页
Behaviour detection models based on automata have been studied widely. By add- ing edge ε, the local automata are combined into global automata to describe and detect soft- ware behaviour. However, these methods in- ... Behaviour detection models based on automata have been studied widely. By add- ing edge ε, the local automata are combined into global automata to describe and detect soft- ware behaviour. However, these methods in- troduce nondeterminacy, leading to models that are imprecise or inefficient. We present a model of software Behaviour Detection based on Process Algebra and system call (BDPA). In this model, a system call is mapped into an action, and a function is mapped into a process We construct a process expression for each function to describe its behaviour. Without con- strutting automata or introducing nondeter- minacy, we use algebraic properties and algo- rithms to obtain a global process expression by combining the process expressions derived from each function. Behaviour detection rules and methods based on BDPA are determined by equivalence theory. Experiments demon- strate that the BDPA model has better preci- sion and efficiency than traditional methods. 展开更多
关键词 intrusion detection software be-haviour model static analysis process algebra system call
在线阅读 下载PDF
New Damage Detection Index Based on Mid-span Displacement and Its Application to Simply Supported Beam 被引量:1
7
作者 王艺霖 刘西拉 方从启 《Journal of Donghua University(English Edition)》 EI CAS 2011年第2期119-123,共5页
This study presents a new idea of using only mid-span displacement measurement for damage detection of simply supported beams. Equivalent element concept is introduced at the beginning. In order to relate the damage d... This study presents a new idea of using only mid-span displacement measurement for damage detection of simply supported beams. Equivalent element concept is introduced at the beginning. In order to relate the damage detectability by means of mid-span dlsplacement measurement with the damage-eaused local stiffness change, a novel index termed as symmetrical mid-span displacement difference index (SMDDI) is proposed. The proposed method based on SMDDI is sensitive to tiny damage and comparatively small quantities of measurements are required during the application process. Another significant attraction of this method is putting aside the knowledge a-priori of the intact state. An example using simulated data has been conducted to examine the suitability of this method and assess its comparative advantages over the previous modal method. 展开更多
关键词 damage detection EQUIVALENT static DISPLACEMENT
在线阅读 下载PDF
Hybrid Malware Variant Detection Model with Extreme Gradient Boosting and Artificial Neural Network Classifiers 被引量:1
8
作者 Asma A.Alhashmi Abdulbasit A.Darem +5 位作者 Sultan M.Alanazi Abdullah M.Alashjaee Bader Aldughayfiq Fuad A.Ghaleb Shouki A.Ebad Majed A.Alanazi 《Computers, Materials & Continua》 SCIE EI 2023年第9期3483-3498,共16页
In an era marked by escalating cybersecurity threats,our study addresses the challenge of malware variant detection,a significant concern for amultitude of sectors including petroleum and mining organizations.This pap... In an era marked by escalating cybersecurity threats,our study addresses the challenge of malware variant detection,a significant concern for amultitude of sectors including petroleum and mining organizations.This paper presents an innovative Application Programmable Interface(API)-based hybrid model designed to enhance the detection performance of malware variants.This model integrates eXtreme Gradient Boosting(XGBoost)and an Artificial Neural Network(ANN)classifier,offering a potent response to the sophisticated evasion and obfuscation techniques frequently deployed by malware authors.The model’s design capitalizes on the benefits of both static and dynamic analysis to extract API-based features,providing a holistic and comprehensive view of malware behavior.From these features,we construct two XGBoost predictors,each of which contributes a valuable perspective on the malicious activities under scrutiny.The outputs of these predictors,interpreted as malicious scores,are then fed into an ANN-based classifier,which processes this data to derive a final decision.The strength of the proposed model lies in its capacity to leverage behavioral and signature-based features,and most importantly,in its ability to extract and analyze the hidden relations between these two types of features.The efficacy of our proposed APIbased hybrid model is evident in its performance metrics.It outperformed other models in our tests,achieving an impressive accuracy of 95%and an F-measure of 93%.This significantly improved the detection performance of malware variants,underscoring the value and potential of our approach in the challenging field of cybersecurity. 展开更多
关键词 API-based hybrid malware detection model static and dynamic analysis malware detection
在线阅读 下载PDF
SlightDetection:一种以太坊智能合约安全漏洞的静态分析工具 被引量:5
9
作者 陈霄汉 赵相福 +1 位作者 张登记 费佳佳 《应用科学学报》 CAS CSCD 北大核心 2022年第4期695-712,共18页
以太坊智能合约若存在安全漏洞,则会导致无可估量的损失。为缓解该问题,提出了一种以静态程序分析技术实现代码全覆盖的智能合约漏洞检测工具SlightDetection。该工具将智能合约源代码转化为对应的抽象语法树,并翻译为XML中间表示;以几... 以太坊智能合约若存在安全漏洞,则会导致无可估量的损失。为缓解该问题,提出了一种以静态程序分析技术实现代码全覆盖的智能合约漏洞检测工具SlightDetection。该工具将智能合约源代码转化为对应的抽象语法树,并翻译为XML中间表示;以几个经典漏洞的特征为例,书写自定义的XPath规则库;将XML中间表示与XPath库作为输入不断遍历XPath规则库并进行匹配,最终得到漏洞检测的报告。该文测试了3个经典合约,充分展示了SlightDetection具有更快、更准确的检测特性;对Etherscan上提供的大量智能合约进行测试并对其中100多份合约进行了手动验证,进一步证明了该工具的有效性。 展开更多
关键词 智能合约 漏洞检测 静态分析 以太坊
在线阅读 下载PDF
Damage detection of frames using the increment of lateral displacement change
10
作者 王建民 陈龙珠 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第3期202-212,共11页
The method proposed in this paper is based on the fact that the damage in different types of structural members has distinctive influence on the structural stiffness. The intrinsic mechanical property of the structure... The method proposed in this paper is based on the fact that the damage in different types of structural members has distinctive influence on the structural stiffness. The intrinsic mechanical property of the structure is tapped and fully utilized for damage detection. The simplified model of the flexibility of frames treats the individual storeys as springs in series and the frame as an equivalent column. It fully considers the main deformation of all beams and columns in the frame. The deformation property of the simplified model accorded well with that of the actual frame model. The obtained increment of lateral displacement change (IOLDC) at the storey level was found to be very sensitive to the local damage in the frame. A damage detection method is pro- posed using the IOLDCs as the damage identification parameters. Numerical examples demonstrate the potential applicability of this method. 展开更多
关键词 Damage detection Increment of lateral displacement change static test FRAME Equivalent column
在线阅读 下载PDF
Research on Known Vulnerability Detection Method Based on Firmware Analysis
11
作者 Wenjing Wang Tengteng Zhao +3 位作者 Xiaolong Li Lei Huang Wei Zhang Hui Guo 《Journal of Cyber Security》 2022年第1期1-15,共15页
At present,the network security situation is becoming more and more serious.Malicious network attacks such as computer viruses,Trojans and hacker attacks are becoming more and more rampant.National and group network a... At present,the network security situation is becoming more and more serious.Malicious network attacks such as computer viruses,Trojans and hacker attacks are becoming more and more rampant.National and group network attacks such as network information war and network terrorism have a serious damage to the production and life of the whole society.At the same time,with the rapid development of Internet of Things and the arrival of 5G era,IoT devices as an important part of industrial Internet system,have become an important target of infiltration attacks by hostile forces.This paper describes the challenges facing firmware vulnerability detection at this stage,and introduces four automatic detection and utilization technologies in detail:based on patch comparison,based on control flow,based on data flow and ROP attack against buffer vulnerabilities.On the basis of clarifying its core idea,main steps and experimental results,the limitations of its method are proposed.Finally,combined with four automatic detection methods,this paper summarizes the known vulnerability detection steps based on firmware analysis,and looks forward to the follow-up work. 展开更多
关键词 IoT devices vulnerability mining automatic detection static analysis
在线阅读 下载PDF
Deadlock Detection:Background,Techniques,and Future Improvements
12
作者 LU Jiachen NIU Zhi +2 位作者 CHEN Li DONG Luming SHEN Taoli 《ZTE Communications》 2024年第2期71-79,共9页
Deadlock detection is an essential aspect of concurrency control in parallel and distributed systems,as it ensures the efficient utilization of resources and prevents indefinite delays.This paper presents a comprehens... Deadlock detection is an essential aspect of concurrency control in parallel and distributed systems,as it ensures the efficient utilization of resources and prevents indefinite delays.This paper presents a comprehensive analysis of the various deadlock detection techniques,including static and dynamic approaches.We discuss the future improvements associated with deadlock detection and provide a comparative evaluation of these techniques in terms of their accuracy,complexity,and scalability.Furthermore,we outline potential future research directions to improve deadlock detection mechanisms and enhance system performance. 展开更多
关键词 deadlock detection static analysis dynamic analysis
在线阅读 下载PDF
结合预训练模型与多模态特征融合的恶意软件检测
13
作者 石智超 韩强 张子豪 《计算机工程与设计》 北大核心 2026年第2期425-433,共9页
针对Android恶意软件的多模态特征检测技术局限性问题,提出了基于预训练模型和多模态融合策略的检测方法。从每个APK的清单、索引和资源文件中提取灰度图像,将其组合为RGB图像以表征应用程序结构,利用预训练的Vision Transformer提取图... 针对Android恶意软件的多模态特征检测技术局限性问题,提出了基于预训练模型和多模态融合策略的检测方法。从每个APK的清单、索引和资源文件中提取灰度图像,将其组合为RGB图像以表征应用程序结构,利用预训练的Vision Transformer提取图像特征;同时使用API敏感性过滤方法筛选API调用序列中的重要特征,利用GraphCodeBERT提取特征向量。采用多头交叉注意力机制生成图像和API序列的融合特征,通过前馈神经网络进行分类。实验结果表明,所提方法能有效检测出Android恶意软件。 展开更多
关键词 恶意软件检测 多模态特征融合 预训练模型 特征过滤 静态检测 敏感特征 模型微调
在线阅读 下载PDF
月壤原位力学特性探测发展与关键技术展望
14
作者 韩宗芳 李玉琼 +4 位作者 李娜 袁征 应黎坪 吴文旭 褚福临 《岩土力学》 北大核心 2026年第3期1110-1128,共19页
获取月壤的原位力学是人类在月面开展科研和建设的先决条件。系统梳理了不同原位探测方法的原理、功能和优缺点,并总结了苏联月球号和美国阿波罗号在月壤原位力学探测方面已取得的研究成果、存在的问题以及目前相关技术的发展趋势。聚... 获取月壤的原位力学是人类在月面开展科研和建设的先决条件。系统梳理了不同原位探测方法的原理、功能和优缺点,并总结了苏联月球号和美国阿波罗号在月壤原位力学探测方面已取得的研究成果、存在的问题以及目前相关技术的发展趋势。聚焦我国月壤原位力学探测技术的研究现状,重点阐述了相关研究单位基于静力触探方法在月壤、星壤原位力学探测方面所开展的预研工作。由于月壤独特的物理性质、极端月球环境以及有限资源的限制,要实现月壤原位力学以及3 m以上更深的精准探测和解译,其关键技术尚待进一步创新和突破。依据我国探月工程的发展需求,提出了月壤原位力学探测亟需重点攻关的技术难点和发展方向。未来的月壤原位力学探测载荷将朝着小型化、自动化、智能化的方向发展,形成作业模式新颖的新原理和新方法,同时在结构设计上进行创新,并嵌入机器学习的技术,AI赋能建立适合月壤的力学参数精准解译方法,从而为我国月壤原位力学探测任务的顺利实施以及实现更准、更深的探测目标提供参考和技术支撑。 展开更多
关键词 月壤 力学参数 静力触探 原位力学探测
原文传递
基于静态特征组合的图神经网络Android恶意软件检测方法
15
作者 韦昊东 万良 《计算机工程》 北大核心 2026年第3期190-200,共11页
安卓(Android)是目前移动智能终端使用最广泛的操作系统,但层出不穷的Android恶意软件给用户带来重大威胁。一些方法对静态分析提取的特征进行处理,以实现Android恶意软件检测,这些方法能够反映软件的一部分属性,但无法捕捉软件潜在恶... 安卓(Android)是目前移动智能终端使用最广泛的操作系统,但层出不穷的Android恶意软件给用户带来重大威胁。一些方法对静态分析提取的特征进行处理,以实现Android恶意软件检测,这些方法能够反映软件的一部分属性,但无法捕捉软件潜在恶意行为意图的特征,使得在面对具备逃避能力的Android恶意软件时难以取得良好的检测性能。为解决该问题,提出一种基于静态特征组合的图神经网络Android恶意软件检测方法。从反编译文件中提取函数调用图,采用node2vec构建每个节点的局部结构特征,同时分析每个节点函数,提取操作码并进行分类,使用Katz算法计算节点重要程度,并根据TF-IDF算法计算图中每个应用程序接口(API)节点对于该Android恶意软件以及所属恶意家族的重要系数,将这些特征相结合作为节点特征,对重要节点进行特征自环,以增强节点间的特征差异。在此基础上,设计基于有向图神经网络(DGCN)与图注意力网络(GAT)的分类器DAg_MAL,该分类器采用gPool层,能有效捕获软件行为的关键调用关系,并筛除不重要的节点。实验结果表明,该方法在二分类与多分类任务中都取得了良好的性能表现,总体检测性能优于其他同类方法。 展开更多
关键词 安卓 恶意软件检测 静态分析 图神经网络 特征嵌入 有向图
在线阅读 下载PDF
基于静态和动态线索的人脸深度伪造的检测方法及其特点
16
作者 孙越涵 毛施云 李慧斌 《西安交通大学学报(医学版)》 北大核心 2026年第2期224-233,共10页
随着深度学习技术的发展以及生成式人工智能的迅速兴起,人脸伪造技术的生成质量不断提升,其潜在滥用风险也日益受到关注。本文对相关领域的研究进行了系统总结,介绍了目前的人脸深度伪造的检测方法,并将其按照线索分为静态检测方法与动... 随着深度学习技术的发展以及生成式人工智能的迅速兴起,人脸伪造技术的生成质量不断提升,其潜在滥用风险也日益受到关注。本文对相关领域的研究进行了系统总结,介绍了目前的人脸深度伪造的检测方法,并将其按照线索分为静态检测方法与动态检测方法。其中静态检测方法包括显性逻辑矛盾检测方法与深层特征差异检测方法,静态检测方法通过辨别伪造图像或视频与原始图像或视频各方面的不同之处而发现伪造痕迹,动态检测方法主要对视频的时序特征以及不同的模态之间进行研究。此外,还梳理了常见的人脸伪造方法、伪造人脸图像及视频的数据集等,并对主动检测策略与提升泛化能力进行了深入探讨。 展开更多
关键词 人脸深度伪造检测 静态检测 动态检测 伪造数据集 泛化能力
在线阅读 下载PDF
基于过程间字符串常量分析的Java注入漏洞检测方法
17
作者 许朴 孙心怡 朱永根 《信息网络安全》 北大核心 2026年第2期304-314,共11页
静态分析包含控制流分析、数据流分析、指针分析、污点分析等方法。这些方法能够基于抽象解释理论在不同抽象域上对程序进行分析,从而获取程序信息。这些信息可以用来辅助编译优化、程序理解、漏洞检测等。注入漏洞是由外部输入危险函... 静态分析包含控制流分析、数据流分析、指针分析、污点分析等方法。这些方法能够基于抽象解释理论在不同抽象域上对程序进行分析,从而获取程序信息。这些信息可以用来辅助编译优化、程序理解、漏洞检测等。注入漏洞是由外部输入危险函数而产生的。针对注入漏洞,静态分析主要采用规则匹配和污点分析两种方案进行检测。规则匹配方案是基于语法规则模版进行漏洞匹配,其误报率较高;污点分析方案利用污点源到目标位置的可达性进行漏洞检测,其依赖污点源及传播规则的完备性。文章利用字符串常量传播算法实现程序中变量引用字符串信息分析,然后,通过字符串信息的危险函数参数分析算法实现对注入漏洞的检测。文章在开源Java静态分析框架Tai-e上实现,该方法命名为ConstStringDetect。在Juliet java v1.3和OWASP v1.2测试集上进行实验,测试CWE-078(命令注入漏洞)、CWE-089(SQL注入漏洞)和CWE-090(LDAP注入漏洞)3种注入漏洞。实验结果表明,文章方法相较于先进静态漏洞检测工具SpotBugs和CodeQL,在没有针对特定函数规则的情况下,召回率高于CodeQL,误报率远低于SpotBugs。 展开更多
关键词 静态分析 抽象解释 漏洞检测
在线阅读 下载PDF
基于机载测量参数的喘振检测逻辑优化设计与验证
18
作者 阙建锋 王玉东 骆广琦 《航空发动机》 北大核心 2026年第2期145-151,共7页
为了安全性考虑,开展优化设计快速准确的喘振检测逻辑研究以提高压气机喘振检测率。通过机载可测量的高压压气机出口静压和转子物理转速等参数,建立了基于B值、高压压气机出口静压2阶变化率、换算加速率的喘振检测的控制逻辑。通过部件... 为了安全性考虑,开展优化设计快速准确的喘振检测逻辑研究以提高压气机喘振检测率。通过机载可测量的高压压气机出口静压和转子物理转速等参数,建立了基于B值、高压压气机出口静压2阶变化率、换算加速率的喘振检测的控制逻辑。通过部件和整机试验数据,优化设计了喘振检测的B值、高压压气机出口静压2阶变化率、换算加速率的阈值、持续时间,并对判喘参数进行不同状态下发动机试验验证。结果表明:通过参数优化和整机的台架试验验证,优化后的方法可以有效区分发动机喘振与熄火故障,检测率高达95%以上,虚警率低于5%以下,响应时间短。通过优化阈值,可以将喘振检测周期从一个周期缩短为半个周期。优化后的方法有利于降低喘振故障对发动机结构带来的危害,同时保证发动机推力控制的可靠性。 展开更多
关键词 喘振检测 出口静压 压力变化率 转速变化率 控制逻辑 机载检测
在线阅读 下载PDF
蒲公英氮自掺杂荧光碳点的制备及对环境中Co^(2+)的识别检测和抗氧化应用
19
作者 王兰兰 王心 +3 位作者 施小宁 刘文丽 隆罗霞 谢永强 《分析测试学报》 北大核心 2026年第2期301-310,共10页
该文采用简便、环保的微波水热法,通过蒲公英中含氮化合物自掺杂制备了蒲公英衍生碳点(TCDs)。表征了T-CDs的光学性质、微观形貌、元素组成及表面官能团。T-CDs表现激发依赖的荧光发射行为,在365 nm紫外灯下呈现蓝色荧光,且具有良好的... 该文采用简便、环保的微波水热法,通过蒲公英中含氮化合物自掺杂制备了蒲公英衍生碳点(TCDs)。表征了T-CDs的光学性质、微观形貌、元素组成及表面官能团。T-CDs表现激发依赖的荧光发射行为,在365 nm紫外灯下呈现蓝色荧光,且具有良好的抗盐、抗光漂白性,在pH 4.0~8.0范围内的荧光性能稳定。T-CDs表面的—NH_(2)、—COOH等官能团与Co^(2+)的特异性络合和内滤波作用可协同猝灭T-CDs的荧光,使T-CDs对Co^(2+)表现高选择性和高灵敏性荧光猝灭识别,其线性检测范围为0~10μmol/L,检出限(LOD)为18 nmol/L(r^(2)=0.99951)。T-CDs可实现对自来水和农田土壤中Co^(2+)的高重现性检测,加标回收率为98.1%~111%,相对标准偏差(RSD)≤3.2%。此外,T-CDs的生物相容性良好,呈显著抗氧化活性,对DPPH·和ABTS+·清除的IC50分别为0.610、0.112 mg/mL,显著优于其水提物。T-CDs这种良好的Co^(2+)识别和自由基清除活性,使其有望应用于复杂环境基质中Co^(2+)简便识别、检测和生物医用抗氧化领域。 展开更多
关键词 蒲公英衍生碳点 微波水热合成 Co^(2+)检测识别 静态猝灭 抗氧化
在线阅读 下载PDF
动静态数据融合的高含硫气井硫堵异常工况识别
20
作者 郭海伟 耿洪涛 +3 位作者 张博 王伊佳 夏乙瑄 蒙玉平 《钻采工艺》 北大核心 2026年第1期218-228,共11页
针对现有高含硫气井硫堵异常工况识别方法在动态异常检测和多工况分类中泛化能力与鲁棒性不足的问题,文章提出基于动态与静态特征融合的模式识别方法,通过融合动态特征的时序表达能力与静态特征的长期规律信息,提高对硫堵异常工况的识... 针对现有高含硫气井硫堵异常工况识别方法在动态异常检测和多工况分类中泛化能力与鲁棒性不足的问题,文章提出基于动态与静态特征融合的模式识别方法,通过融合动态特征的时序表达能力与静态特征的长期规律信息,提高对硫堵异常工况的识别精度和泛化能力。首先,结合Prophet、LSTM和孤立森林模型对动态参数时间序列进行异常检测,准确识别趋势异常与突发异常,实现硫堵异常的初步判别;其次,采用滑动窗口对动态时间序列进行分割,提取硫堵相关的统计特征,结合SMOTE算法实现样本平衡;最后,构建动静态特征融合模型:动态分支采用GRU和LSTM挖掘时间序列长期依赖关系和动态模式信息,静态分支通过全连接网络表征高维静态特征,两分支通过全连接层融合后统一映射到分类任务上,提高对复杂工况的分类能力。基于普光气田历史数据的模型评估与现场应用结果表明,该方法表现出较好的准确性和鲁棒性,可为高含硫气井硫堵风险识别预警及运维决策提供技术支撑。 展开更多
关键词 高含硫气井 工况异常 动静态特征融合 时间序列异常检测 人工智能
在线阅读 下载PDF
上一页 1 2 45 下一页 到第
使用帮助 返回顶部