期刊文献+
共找到394,737篇文章
< 1 2 250 >
每页显示 20 50 100
基于NET Web开发技术的电网运营管理与自动化监测研究
1
作者 潘鸿飞 刑应春 +2 位作者 王喜银 尹晨旭 曹洁 《自动化技术与应用》 2026年第1期171-175,共5页
以往电网的运营涉及很多不确定性因素而影响了电网运营监测的状态分析过程,导致监测结果准确度不高影响了电网运营管理效果。为此提出了基于NET Web开发技术的电网运营管理与自动化监测方法。该方法首先深入分析电网发电与供电环节的不... 以往电网的运营涉及很多不确定性因素而影响了电网运营监测的状态分析过程,导致监测结果准确度不高影响了电网运营管理效果。为此提出了基于NET Web开发技术的电网运营管理与自动化监测方法。该方法首先深入分析电网发电与供电环节的不确定性因素,通过定量计算构建综合性管理指标。随后,运用NET Web开发技术构建数据处理架构,有效访问电网运营数据。进而,通过解析数据的经验谱分布函数值,实现对电网运营的自动化监测。实验结果表明,此方法能准确监测电网运营状态,有效满足电网运营管理需求。本研究不仅提升了电网运营的监测精度,也为电网的自动化管理提供有力支持,对提升电网运营效率具有重要意义。 展开更多
关键词 电网运营 自动化监测 net web 程序开发技术
在线阅读 下载PDF
A Comprehensive Literature Review of AI-Driven Application Mapping and Scheduling Techniques for Network-on-Chip Systems
2
作者 Naveed Ahmad Muhammad Kaleem +5 位作者 Mourad Elloumi Muhammad Azhar Mushtaq Ahlem Fatnassi Mohd Fazil Anas Bilal Abdulbasit A.Darem 《Computer Modeling in Engineering & Sciences》 2026年第1期118-155,共38页
Network-on-Chip(NoC)systems are progressively deployed in connecting massively parallel megacore systems in the new computing architecture.As a result,application mapping has become an important aspect of performance ... Network-on-Chip(NoC)systems are progressively deployed in connecting massively parallel megacore systems in the new computing architecture.As a result,application mapping has become an important aspect of performance and scalability,as current trends require the distribution of computation across network nodes/points.In this paper,we survey a large number of mapping and scheduling techniques designed for NoC architectures.This time,we concentrated on 3D systems.We take a systematic literature review approach to analyze existing methods across static,dynamic,hybrid,and machine-learning-based approaches,alongside preliminary AI-based dynamic models in recent works.We classify them into several main aspects covering power-aware mapping,fault tolerance,load-balancing,and adaptive for dynamic workloads.Also,we assess the efficacy of each method against performance parameters,such as latency,throughput,response time,and error rate.Key challenges,including energy efficiency,real-time adaptability,and reinforcement learning integration,are highlighted as well.To the best of our knowledge,this is one of the recent reviews that identifies both traditional and AI-based algorithms for mapping over a modern NoC,and opens research challenges.Finally,we provide directions for future work toward improved adaptability and scalability via lightweight learned models and hierarchical mapping frameworks. 展开更多
关键词 application mapping mapping techniques netWORK-ON-CHIP system on chip optimisation
在线阅读 下载PDF
基于前后端联合分析的Java Web漏洞挖掘方法
3
作者 邹福泰 姜开达 +2 位作者 占天越 施纬 张亮 《计算机研究与发展》 北大核心 2026年第1期214-226,共13页
精准高效地挖掘Web应用当中存在的安全漏洞具有极高的研究价值。Web漏洞挖掘相关研究大多是针对PHP应用的,无法直接应用于Java Web漏洞挖掘。且现有的Web漏洞挖掘方法难以适应批量高效的需求,即难以在保持静态代码分析的性能下取得动态... 精准高效地挖掘Web应用当中存在的安全漏洞具有极高的研究价值。Web漏洞挖掘相关研究大多是针对PHP应用的,无法直接应用于Java Web漏洞挖掘。且现有的Web漏洞挖掘方法难以适应批量高效的需求,即难以在保持静态代码分析的性能下取得动态分析的精确度。为解决上述问题,提出了一种前后端联合分析的Web漏洞挖掘方法,利用前端解析提取污点源信息来帮助后端分析进行剪枝,提高漏洞覆盖率和检测性能;同时在漏洞挖掘时利用程序的动静态信息进行代码建模,结合数据流分析、污点分析、符号执行以及轻量动态求解技术完成漏洞的挖掘和验证,在引入较少开销前提下带来较大的效果提升。选取了CVE(common vulnerabilities and exposure)漏洞、开源CMS(content management system)以及开源社区应用中共105个Java Web漏洞对所提出的方法进行了实验,证明了各模块具有较好的分析效果,整体具有较强的漏洞挖掘能力。 展开更多
关键词 web安全 JAVA 漏洞挖掘 污点分析 符号执行
在线阅读 下载PDF
1+X证书制度下Web前端开发数据库技术课程标准
4
作者 雷华军 潘萍 《办公自动化》 2026年第1期1-3,115,共4页
数据库技术是软件技术专业的基础课程,是Web前端开发中级、高级的核心课程。数据库技术课程标准对于Web前端开发课程的开展尤其重要。文章分析数据库技术现有课程标准存在的问题,基于1+X证书制度下Web前端开发人才培养模式,重新制定数... 数据库技术是软件技术专业的基础课程,是Web前端开发中级、高级的核心课程。数据库技术课程标准对于Web前端开发课程的开展尤其重要。文章分析数据库技术现有课程标准存在的问题,基于1+X证书制度下Web前端开发人才培养模式,重新制定数据库技术课程标准。 展开更多
关键词 1+X证书 web前端开发 数据库技术 课程标准
在线阅读 下载PDF
面向通用数字对象的Web3扩展域名系统
5
作者 李旭东 程子果 +1 位作者 黄宇豪 任文 《计算机工程与设计》 北大核心 2026年第1期88-95,共8页
为了解决传统域名系统不支持数字对象及服务的问题,提出面向通用数字对象的Web3扩展域名系统架构,并实现通用域名系统(GNS)。将数字对象定义进一步丰富拓展为通用数字对象,并细分为简单数字对象和复合数字对象。提出一种全新的域名服务... 为了解决传统域名系统不支持数字对象及服务的问题,提出面向通用数字对象的Web3扩展域名系统架构,并实现通用域名系统(GNS)。将数字对象定义进一步丰富拓展为通用数字对象,并细分为简单数字对象和复合数字对象。提出一种全新的域名服务系统架构与GNSP协议,设计链上、链下业务数据相结合的系统模式,以弥补纯链上模式的性能缺陷。针对海量数字对象所带来的性能和访问压力较大的问题,引入基于LRU-K的数字对象缓存模块,提高系统性能。通过实验性能评估,验证了GNS的有效性与高效性。 展开更多
关键词 域名系统 web3互联网 数字对象 web3域名系统 区块链 智能合约 以太坊
在线阅读 下载PDF
Web 3.0时代平台互联互通的偏差及其因应之策
6
作者 叶明 姚莹 《南京邮电大学学报(社会科学版)》 2026年第1期72-83,共12页
平台互联互通是Web 3.0时代的应有之义,然而其尚存在封闭式竞争行为屡禁不止,歧视性互联互通愈显,互联互通的范围层次有待提升等多重偏差。仔细审视背后的诱因,可以归结为平台互联互通嵌含利益冲突,存在规范与技术罅漏及运动式监管的局... 平台互联互通是Web 3.0时代的应有之义,然而其尚存在封闭式竞争行为屡禁不止,歧视性互联互通愈显,互联互通的范围层次有待提升等多重偏差。仔细审视背后的诱因,可以归结为平台互联互通嵌含利益冲突,存在规范与技术罅漏及运动式监管的局限。有鉴于此,应革新互联互通的推行理念,由强制互联变为顺“市”而为,同时廓清平衡数据开放与数据隐私保护的思路,以纾解利益冲突。在规范和技术方面,需要体系化完善数据要素制度规范、强化技术支撑从而消除推行隐忧。此外,还应破除运动式监管模式的窠臼,构建平台互联互通的常态化监管机制。 展开更多
关键词 web 3.0 平台 平台治理 平台互联互通 数据 数据监管 数据要素制度
在线阅读 下载PDF
MATLAB WEB SERVER AND ITS APPLICATION IN REMOTE COLLABORATIVE DESIGN OF MAGNETIC BEARING SYSTEMS 被引量:6
7
作者 Zhao Aiping Yu Lie Xie Youbai Theory of Lubrication and Bearing Institute,Xi’an Jiaotong University 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2001年第2期179-183,共5页
Acclimatizing itself to the development of network,Math Works Inc constructed a MATLAB Web Server environment by dint of which one can browse the calculation and plots of MATLAB through Internet directly.The installat... Acclimatizing itself to the development of network,Math Works Inc constructed a MATLAB Web Server environment by dint of which one can browse the calculation and plots of MATLAB through Internet directly.The installation and use of the environment is introduced.A code established on the platform of MATLAB,which deals with the modal analysis of magnetic bearing system(MBS) supporting rotors of five degrees of freedom and considering the coupling of thrust bearing with radical bearings is modified to work in the environment.The purpose is to realize a remote call of the code by users through Internet for the performance analysis of the system.Such an application is very important to the concurrent design of MBS and for the utilization of distributive knowledge acquisition resources in collaborative design.The work on modification and realization is described and the results are discussed. 展开更多
关键词 MATLAB web Server Remote call Magnetic bearing rotor system Concurrent design
在线阅读 下载PDF
Application Research and Implementation of the CORBA-Based Web Distributed Network Management System 被引量:3
8
作者 WANGFeng SHIBing-xin 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期699-705,共7页
The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Archite... The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering. 展开更多
关键词 distributed web network management CORBA JAVA
在线阅读 下载PDF
一种面向快速Web漏洞扫描的网页爬取方法
9
作者 王金翔 朱亚运 +3 位作者 刘万大山 姜琳 刘林彬 李俊娥 《计算机应用与软件》 北大核心 2026年第1期370-376,共7页
随着Web应用规模的不断扩大,对网站进行漏洞扫描的时间成本也不断增加。为此,提出一种面向快速Web漏洞扫描的网页爬取方法。该方法在传统的面向Web漏洞扫描的爬虫的基础上,利用增量闭频繁项集挖掘算法对网站页面进行阶段性聚类,并基于... 随着Web应用规模的不断扩大,对网站进行漏洞扫描的时间成本也不断增加。为此,提出一种面向快速Web漏洞扫描的网页爬取方法。该方法在传统的面向Web漏洞扫描的爬虫的基础上,利用增量闭频繁项集挖掘算法对网站页面进行阶段性聚类,并基于页面聚簇和爬虫日志构建页面分类模型,以过滤由同一个服务处理程序生成的冗余页面。实验表明,该方法能有效减少漏洞扫描系统在网站目录遍历和页面聚类上消耗的时间,从而提升Web漏洞扫描的效率。 展开更多
关键词 爬虫 web漏洞扫描 页面聚类 频繁模式挖掘
在线阅读 下载PDF
基于BERT-GATv2的PHP Webshell检测方法
10
作者 张文涛 张小萍 宁梓桁 《重庆邮电大学学报(自然科学版)》 北大核心 2026年第1期137-145,共9页
Webshell是一种基于Web语言的网站后门程序,通常被攻击者用来控制Web服务器。近年来,Webshell免杀技术的发展使得静态特征匹配等传统检测方法对混淆加密后的Webshell检测能力下降。对Webshell检测方法的研究在Web安全领域越来越得到重视... Webshell是一种基于Web语言的网站后门程序,通常被攻击者用来控制Web服务器。近年来,Webshell免杀技术的发展使得静态特征匹配等传统检测方法对混淆加密后的Webshell检测能力下降。对Webshell检测方法的研究在Web安全领域越来越得到重视,针对现有的Webshell检测方法难以充分挖掘Webshell的语法和语义特征的问题,提出了一种基于BERT-GATv2的PHP Webshell检测方法。该方法使用PHP代码构建异构图,并通过联合训练BERT模型和图注意力网络v2(GATv2)模型,用线性插值方法结合2个模型的输出,实现对正常样本和Webshell的分类。实验结果表明,与以往的Webshell检测方法相比,提出的Webshell检测方法在精确率、召回率和F1值指标上均展现出优异的检测性能,准确率达到了99.65%。 展开更多
关键词 webshell检测 图神经网络 web安全 深度学习
在线阅读 下载PDF
Application Research of Wireless Sensor Networks and the Internet of Things 被引量:1
11
作者 Changjian Lv Rui Wang Man Zhao 《Journal of Electronic Research and Application》 2025年第4期283-289,共7页
In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),dee... In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers. 展开更多
关键词 Wireless Sensor networks Internet of Things Key technologies application fields
在线阅读 下载PDF
Programming ferromagnetic soft materials for miniature soft robots:Design,fabrication,and applications 被引量:1
12
作者 Junliang Chen Dongdong Jin +1 位作者 Qianqian Wang Xing Ma 《Journal of Materials Science & Technology》 2025年第16期271-287,共17页
Due to the small size,active mobility,and intrinsic softness,miniature soft robots hold promising po-tentials in reaching the deep region inside living bodies otherwise inaccessible with compelling agility,adaptabilit... Due to the small size,active mobility,and intrinsic softness,miniature soft robots hold promising po-tentials in reaching the deep region inside living bodies otherwise inaccessible with compelling agility,adaptability and safety.Various materials and actuation strategies have been developed for creating soft robots,among which,ferromagnetic soft materials that self-actuate in response to external magnetic fields have attracted worldwide attention due to their remote controllability and excellent compatibil-ity with biological tissues.This review presents comprehensive and systematic research advancements in the design,fabrication,and applications of ferromagnetic soft materials for miniature robots,providing in-sights into their potential use in biomedical fields and beyond.The programming strategies of ferromag-netic soft materials are summarized and classified,including mold-assisted programming,3D printing-assisted programming,microassembly-assisted programming,and magnetization reprogramming.Each approach possesses unique advantages in manipulating the magnetic responsiveness of ferromagnetic soft materials to achieve outstanding actuation and deformation performances.We then discuss the biomedi-cal applications of ferromagnetic soft material-based soft robots(e.g.,minimally invasive surgery,targeted delivery,and tissue engineering),highlighting their potentials in revolutionizing biomedical technologies.This review also points out the current challenges and provides insights into future research directions,which we hope can serve as a useful reference for the development of next-generation adaptive miniature robots. 展开更多
关键词 Ferromagnetic soft materials Miniature soft robots Magnetic actuation Magnetization programming strategies Biomedical applications
原文传递
Blockchain-Enabled Data Secure Sharing with Privacy Protection Based on Proxy Re-Encryption in Web3.0 Applications 被引量:1
13
作者 Ma Jiawei Zhou Haojie +2 位作者 Wang Sidie Song Jiyuan Tian Tian 《China Communications》 2025年第5期256-272,共17页
With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the... With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance. 展开更多
关键词 blockchain data sharing privacy protection proxy re-encryption web3.0
在线阅读 下载PDF
Secure Development Methodology for Full Stack Web Applications:Proof of the Methodology Applied to Vue.js,Spring Boot and MySQL
14
作者 Kevin Santiago Rey Rodriguez Julián David Avellaneda Galindo +3 位作者 Josep Tárrega Juan Juan Ramón Bermejo Higuera Javier Bermejo Higuera Juan Antonio Sicilia Montalvo 《Computers, Materials & Continua》 2025年第10期1807-1858,共52页
In today’s rapidly evolving digital landscape,web application security has become paramount as organizations face increasingly sophisticated cyber threats.This work presents a comprehensive methodology for implementi... In today’s rapidly evolving digital landscape,web application security has become paramount as organizations face increasingly sophisticated cyber threats.This work presents a comprehensive methodology for implementing robust security measures in modern web applications and the proof of the Methodology applied to Vue.js,Spring Boot,and MySQL architecture.The proposed approach addresses critical security challenges through a multi-layered framework that encompasses essential security dimensions including multi-factor authentication,fine-grained authorization controls,sophisticated session management,data confidentiality and integrity protection,secure logging mechanisms,comprehensive error handling,high availability strategies,advanced input validation,and security headers implementation.Significant contributions are made to the field of web application security.First,a detailed catalogue of security requirements specifically tailored to protect web applications against contemporary threats,backed by rigorous analysis and industry best practices.Second,the methodology is validated through a carefully designed proof-of-concept implementation in a controlled environment,demonstrating the practical effectiveness of the security measures.The validation process employs cutting-edge static and dynamic analysis tools for comprehensive dependency validation and vulnerability detection,ensuring robust security coverage.The validation results confirm the prevention and avoidance of security vulnerabilities of the methodology.A key innovation of this work is the seamless integration of DevSecOps practices throughout the secure Software Development Life Cycle(SSDLC),creating a security-first mindset from initial design to deployment.By combining proactive secure coding practices with defensive security approaches,a framework is established that not only strengthens application security but also fosters a culture of security awareness within development teams.This hybrid approach ensures that security considerations are woven into every aspect of the development process,rather than being treated as an afterthought. 展开更多
关键词 web security methodology secure software development lifecycle DevSecOps security requirements secure development Full Stack web applications
在线阅读 下载PDF
基于BERT和GRU的Web攻击检测模型研究
15
作者 谭攀 王海珍 成雨玫 《齐齐哈尔大学学报(自然科学版)》 2026年第1期30-37,共8页
目前Web攻击日益频繁和复杂,现有入侵检测系统的检测准确率、实时性需要进一步改进。为此,提出一种基于BERT和GRU的Web攻击检测模型BERT_GRU。通过Web攻击检测脚本Scalp进行攻击类型标注,利用预训练的BERT模型对HTTP请求中的文本数据进... 目前Web攻击日益频繁和复杂,现有入侵检测系统的检测准确率、实时性需要进一步改进。为此,提出一种基于BERT和GRU的Web攻击检测模型BERT_GRU。通过Web攻击检测脚本Scalp进行攻击类型标注,利用预训练的BERT模型对HTTP请求中的文本数据进行上下文语义编码、全连接层处理,将获得的数据与原始文本数据拼接,输入GRU网络提取序列特征,输出通过Softmax计算,最终实现多分类。在CSIC 2010数据集和FWAF数据集上的实验结果表明,BERT_GRU模型在准确率、召回率、F1值等评价指标以及训练时间方面均优于对比模型。 展开更多
关键词 web攻击检测 BERT模型 GRU
在线阅读 下载PDF
Dynamic effect web generation for heterogeneous UAV cluster using DQN-based NSGA-Ⅱ:Methods and applications 被引量:1
16
作者 Pei CHI Chen LIU +2 位作者 Jiang ZHAO Kun WU Yingxun WANG 《Chinese Journal of Aeronautics》 2025年第7期374-388,共15页
Effect web will be an important combat means to achieve accurate,efficient,agile and reliable destruction of enemy targets.The use of Unmanned Aerial Vehicles(UAV)cluster in warfare has become a key element in the bat... Effect web will be an important combat means to achieve accurate,efficient,agile and reliable destruction of enemy targets.The use of Unmanned Aerial Vehicles(UAV)cluster in warfare has become a key element in the battle for military superiority between nations.The construction of UAV cluster effect web is a kind of combinatorial optimization in essence.By selecting the optimal combination in the limited equipment concentration,the whole network can be optimized.Firstly,in order to improve the combinatorial optimization efficiency of UAV cluster effect web,NSGA-Ⅱbased on deep Q-network(DQN-based NSGA-Ⅱ)is proposed.This algorithm is used to solve the Multi-Objective Combinatorial Optimization(MOCO)problem in the construction of effect web.Secondly,a dynamic generation method is devised to solve the problem caused by the possible destruction of enemy and our node under the fierce confrontation between the two sides.Finally,the simulation results show that the DQN-based NSGA-Ⅱis better than the genetic algorithm with single operator.The comparison experiment shows that the weight of evaluation indexes will have a corresponding influence on the optimization results. 展开更多
关键词 Optimization Effect web Unmanned Aerial Vehicles(UAV) Deep learning Genetic algorithm
原文传递
Application and Realization of Hierarchical Network Planning Based on Web 被引量:1
17
作者 WU Shi-jing GONG Zhi-bo +2 位作者 YIN Yong HUANG He-chao LOU Wei-hua 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期839-844,共6页
Making use of Microsoft Visual Studio.NET platform,hierarchical network planning is realized in working procedure time-optimization of the construction by TBM,and hierarchical network graph of the construction by TBM ... Making use of Microsoft Visual Studio.NET platform,hierarchical network planning is realized in working procedure time-optimization of the construction by TBM,and hierarchical network graph of the construction by TBM is drawn based on browser.Then the theory of system realization is discussed,six components of system that can be reused are explained emphatically.The realization of hierarchical network panning in Internet provides available guarantee for controlling rate of progress in large-scale or middle-sized projects. 展开更多
关键词 web network graph hierarchical network planning
在线阅读 下载PDF
Access to emergency medical services in Beijing:integrating web mapping application programming interfaces and empirical Bayesian Kriging interpolation analysis
18
作者 Haolin Zhu Mo Xu +2 位作者 Luying Zhu Sijia Tian Jinjun Zhang 《World Journal of Emergency Medicine》 2025年第3期266-268,共3页
Emergency medical services (EMS) are a vital element of the public healthcare system in China,^([1])providing an opportunity to respond to critical medical conditions and save people’s lives.^([2])The accessibility o... Emergency medical services (EMS) are a vital element of the public healthcare system in China,^([1])providing an opportunity to respond to critical medical conditions and save people’s lives.^([2])The accessibility of EMS has received considerable attention in health and transport geography studies.^([3])One of the optimal gauges for evaluating the accessibility of EMS is the response time,which is defined as the time from receiving an emergency call to the arrival of an ambulance.^([4])Beijing has already reduced the response time to approximately12 min,and the next goal is to ensure that the response time across Beijing does not exceed 12 min (the information comes from the Beijing Emergency Medical Center). 展开更多
关键词 emergency medical services public healthcare system web mapping application programming interfaces empirical bayesian kriging interpolation analysis ACCESSIBILITY respond critical medical conditions response time
暂未订购
面向Web3钓鱼网站的域名检测与网页分析方法
19
作者 刘荣龙 李梓炜 +2 位作者 万悦 吴嘉婧 蒋子规 《计算机工程》 北大核心 2026年第1期76-85,共10页
Web3作为“去中心化的下一代互联网”范式,依托区块链技术,成为数智服务生态中极具潜力的新兴领域。然而,Web3钓鱼网站对生态健康构成了严重威胁,钓鱼者精心设计域名作为主要诱饵,诱导用户访问并进行高风险操作以窃取数字资产。目前,Web... Web3作为“去中心化的下一代互联网”范式,依托区块链技术,成为数智服务生态中极具潜力的新兴领域。然而,Web3钓鱼网站对生态健康构成了严重威胁,钓鱼者精心设计域名作为主要诱饵,诱导用户访问并进行高风险操作以窃取数字资产。目前,Web3反钓鱼工作主要集中在钓鱼账户检测、钓鱼交易检测和钓鱼团伙挖掘,而现有钓鱼网站域名检测工作主要面向传统钓鱼网站,存在适应性不足、缺乏系统性分析等局限性。为此,提出一种针对Web3钓鱼网站域名的检测方法WPWHunter,对检测到的真实Web3钓鱼网站进行多维度分析,并探究大语言模型(LLM)在网页分析方面的应用潜力。WPWHunter检测算法对Web3钓鱼网站域名中的诱导词、视觉欺骗、项目名模仿3种特征进行检测,实验结果表明,WPWHunter能够有效检测出可疑的Web3钓鱼域名,在测试集上G-means指标达到0.769,相比表现最佳的基线方法提升了0.048。此外,作为补充的探索实验,使用3个通用LLM对WPWHunter未能成功检测的Web3钓鱼网页内容进行分析,总结LLM判定Web3钓鱼网站时的依据。 展开更多
关键词 web3 网络安全 钓鱼网站 域名检测 大语言模型
在线阅读 下载PDF
Bio-inspired Magnetic Helical Miniature Robots:Mechanisms,Control and Biomedical Applications
20
作者 Aoji Zhu Yangmin Li +1 位作者 Yongping Zheng Lidong Yang 《Journal of Bionic Engineering》 2025年第6期2805-2830,共26页
Inspired by bacterial motility mechanisms,Magnetic Helical Miniature Robots(MHMRs)exhibit promising applications in biomedical fields due to their efficient locomotion and compatibility with biological tissues.In this... Inspired by bacterial motility mechanisms,Magnetic Helical Miniature Robots(MHMRs)exhibit promising applications in biomedical fields due to their efficient locomotion and compatibility with biological tissues.In this review,we systematically survey the basics of MHMRs,from propulsion mechanism,magnetization and control methods to biomedical applications,aiming to provide readers with an easily understandable overview and fundamental knowledge on implementing MHMRs.The MHMRs are actuated by rotating magnetic fields,achieving steering and rotation through magnetic torque,and converting rotation into forward motion through the helical structure.Magnetization methods for MHMRs are reviewed into three types:attaching magnets,magnetic coatings,and magnetic powder doping.Additionally,this review discusses the control methods for MHMRs,covering imaging techniques,path tracking control—including classical control algorithms and increasingly popular learning-based methods,and swarm control.Subsequently,a comprehensive survey is conducted on the biomedical applications of MHMRs in the treatment of vascular diseases,drug delivery,cell delivery,and their integration with catheters.We finally provide a perspective about future challenges in MHMR research,including enhancing functional design capabilities,developing swarm-assisted independent control mechanisms,refining in vivo imaging techniques,and ensuring robust biocompatibility for safe medical use. 展开更多
关键词 Biologically-inspired robots Miniature robots Magnetic control Biomedical application
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部