期刊文献+
共找到633篇文章
< 1 2 32 >
每页显示 20 50 100
指挥与控制学报征稿启事
1
作者 《指挥与控制学报》编辑部 《指挥与控制学报》 北大核心 2025年第3期I0005-I0005,共1页
学报简介:《指挥与控制学报》(Journal of Command and Control)是中国指挥与控制学会会刊,由北方自动控制技术研究所和中国指挥与控制学会共同主办,2015年创刊。现为中文核心期刊、CSCD核心期刊、中国科技核心期刊、RCCSE中国权威学术... 学报简介:《指挥与控制学报》(Journal of Command and Control)是中国指挥与控制学会会刊,由北方自动控制技术研究所和中国指挥与控制学会共同主办,2015年创刊。现为中文核心期刊、CSCD核心期刊、中国科技核心期刊、RCCSE中国权威学术期刊(A+)等。 展开更多
关键词 指挥与控制学报 Journal of Command and Control
在线阅读 下载PDF
指挥与控制学报征稿启事
2
作者 《指挥与控制学报》编辑部 《指挥与控制学报》 北大核心 2025年第5期I0005-I0005,共1页
学报简介:《指挥与控制学报》(Journal of Command and Control)是中国指挥与控制学会会刊,由北方自动控制技术研究所和中国指挥与控制学会共同主办,2015年创刊。现为中文核心期刊、CSCD核心期刊、中国科技核心期刊、RCCSE中国权威学术... 学报简介:《指挥与控制学报》(Journal of Command and Control)是中国指挥与控制学会会刊,由北方自动控制技术研究所和中国指挥与控制学会共同主办,2015年创刊。现为中文核心期刊、CSCD核心期刊、中国科技核心期刊、RCCSE中国权威学术期刊(A+)等。 展开更多
关键词 指挥与控制学报 Journal of Command and Control
在线阅读 下载PDF
指挥与控制学报征稿启事
3
作者 《指挥与控制学报》编辑部 《指挥与控制学报》 北大核心 2025年第4期I0005-I0005,共1页
学报简介:《指挥与控制学报》(Journal of Command and Control)是中国指挥与控制学会会刊,由北方自动控制技术研究所和中国指挥与控制学会共同主办,2015年创刊。现为中文核心期刊、CSCD核心期刊、中国科技核心期刊、RCCSE中国权威学术... 学报简介:《指挥与控制学报》(Journal of Command and Control)是中国指挥与控制学会会刊,由北方自动控制技术研究所和中国指挥与控制学会共同主办,2015年创刊。现为中文核心期刊、CSCD核心期刊、中国科技核心期刊、RCCSE中国权威学术期刊(A+)等。 展开更多
关键词 指挥与控制学报 Journal of Command and Control
在线阅读 下载PDF
Utilizing Fine-Tuning of Large Language Models for Generating Synthetic Payloads:Enhancing Web Application Cybersecurity through Innovative Penetration Testing Techniques
4
作者 Stefan Cirkovic Vladimir Mladenovic +2 位作者 Siniša Tomic Dalibor Drljaca Olga Ristic 《Computers, Materials & Continua》 2025年第3期4409-4430,共22页
With the increasing use of web applications,challenges in the field of cybersecurity are becoming more complex.This paper explores the application of fine-tuned large language models(LLMs)for the automatic generation ... With the increasing use of web applications,challenges in the field of cybersecurity are becoming more complex.This paper explores the application of fine-tuned large language models(LLMs)for the automatic generation of synthetic attacks,including XSS(Cross-Site Scripting),SQL Injections,and Command Injections.A web application has been developed that allows penetration testers to quickly generate high-quality payloads without the need for in-depth knowledge of artificial intelligence.The fine-tuned language model demonstrates the capability to produce synthetic payloads that closely resemble real-world attacks.This approach not only improves the model’s precision and dependability but also serves as a practical resource for cybersecurity professionals to enhance the security of web applications.The methodology and structured implementation underscore the importance and potential of advanced language models in cybersecurity,illustrating their effectiveness in generating high-quality synthetic data for penetration testing purposes.The research results demonstrate that this approach enables the identification of vulnerabilities that traditional methods may not uncover,providing deeper insights into potential threats and enhancing overall security measures.The performance evaluation of the model indicated satisfactory results,while further hyperparameter optimization could improve accuracy and generalization capabilities.This research represents a significant step forward in improving web application security and opens new opportunities for the use of LLMs in security testing,thereby contributing to the development of more effective cybersecurity strategies. 展开更多
关键词 LLM GPT-2 XSS SQL injection command injection evaluation loss perplexity
在线阅读 下载PDF
Learning Manipulation from Expert Demonstrations Based on Multiple Data Associations and Physical Constraints
5
作者 Yangqing Ye Yaojie Mao +5 位作者 Shiming Qiu Chuan’guo Tang Zhirui Pan Weiwei Wan Shibo Cai Guanjun Bao 《Chinese Journal of Mechanical Engineering》 2025年第2期279-294,共16页
Learning from demonstration is widely regarded as a promising paradigm for robots to acquire diverse skills.Other than the artificial learning from observation-action pairs for machines,humans can learn to imitate in ... Learning from demonstration is widely regarded as a promising paradigm for robots to acquire diverse skills.Other than the artificial learning from observation-action pairs for machines,humans can learn to imitate in a more versatile and effective manner:acquiring skills through mere“observation”.Video to Command task is widely perceived as a promising approach for task-based learning,which yet faces two key challenges:(1)High redundancy and low frame rate of fine-grained action sequences make it difficult to manipulate objects robustly and accurately.(2)Video to Command models often prioritize accuracy and richness of output commands over physical capabilities,leading to impractical or unsafe instructions for robots.This article presents a novel Video to Command framework that employs multiple data associations and physical constraints.First,we introduce an object-level appearancecontrasting multiple data association strategy to effectively associate manipulated objects in visually complex environments,capturing dynamic changes in video content.Then,we propose a multi-task Video to Command model that utilizes object-level video content changes to compile expert demonstrations into manipulation commands.Finally,a multi-task hybrid loss function is proposed to train a Video to Command model that adheres to the constraints of the physical world and manipulation tasks.Our method achieved over 10%on BLEU_N,METEOR,ROUGE_L,and CIDEr compared to the up-to-date methods.The dual-arm robot prototype was established to demonstrate the whole process of learning from an expert demonstration of multiple skills and then executing the tasks by a robot. 展开更多
关键词 Videos to command Multiple data associations Multi-task model Multi-task hybrid loss function Physical constraints
在线阅读 下载PDF
Profoundly Commanding the Rich Connotation and Construction Path for a Mankind Community of Shared future
6
作者 Han Qingxiang 《Peace》 2017年第2期30-33,共4页
To build a mankind community of shared future is an important concept and initiative put forward by the Communist Party of China Central Committee(CPCCC)with Comrade Xi Jinping as the core to co-ordinate domestic situ... To build a mankind community of shared future is an important concept and initiative put forward by the Communist Party of China Central Committee(CPCCC)with Comrade Xi Jinping as the core to co-ordinate domestic situation and international situation,and is an important part of the CPCCC‘s 展开更多
关键词 of it that BE as IS for Profoundly commanding the Rich Connotation and Construction Path for a Mankind Community of Shared future
原文传递
Commanding the Commander:structure of a key protein machinery in endosomal trafficking 被引量:1
7
作者 Xin Yong Chunzhuang Zhou +1 位作者 Daniel D.Billadeau Da Jia 《Signal Transduction and Targeted Therapy》 SCIE CSCD 2023年第9期3877-3879,共3页
In a recent study published in Cell1 and two bioRxiv pre-prints,2,3 three studies investigate the structure of the endosomal Commander complex through a combination of X-ray crystal-lography,cryogenic-electron microsc... In a recent study published in Cell1 and two bioRxiv pre-prints,2,3 three studies investigate the structure of the endosomal Commander complex through a combination of X-ray crystal-lography,cryogenic-electron microscopy(Cryo-EM),Alphafold predictions and extensive site-directed mutagenesis(Fig.1a),which sheds lights on the molecular characteristics of this evolutionarily-conserved protein machinery,and enables the mapping of mutations causing X-linked intellectual disability(XILD)and Ritscher-Schinzel syndrome(RSS).When proteins enter the endosomal network,they are either transported to lysosome for degradation,or recycled to the plasma membrane or the trans-Golgi network for reuse.Multiple protein machineries are essential for the process,including Retromer,Commander,and several members of the sorting nexin(SNX)family.Commander genes are highly conserved in metazoa and can be found in almost all tissues and cells. 展开更多
关键词 COMMANDER COMMAND SORTING
原文传递
A framework of force of information influence and application for C4KISR system
8
作者 MAO Shaojie DIAO Lianwang +6 位作者 SUN Yu WANG Heng YI Kan XU Xin MAO Xiaobin ZHANG Kecheng SHENG Long 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期430-443,共14页
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e... The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture. 展开更多
关键词 information warfare command control communications computer KILL intelligence surveillance reconnaissance(C4KISR)system information circulation force of information influence information entropy
在线阅读 下载PDF
Command filtered integrated estimation guidance and control for strapdown missiles with circular field of view
9
作者 Wei Wang Jiaqi Liu +2 位作者 Shiyao Lin Baokui Geng Zhongjiao Shi 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第5期211-221,共11页
In this paper,an integrated estimation guidance and control(IEGC)system is designed based on the command filtered backstepping approach for circular field-of-view(FOV)strapdown missiles.The threedimensional integrated... In this paper,an integrated estimation guidance and control(IEGC)system is designed based on the command filtered backstepping approach for circular field-of-view(FOV)strapdown missiles.The threedimensional integrated estimation guidance and control nonlinear model with limited actuator deflection angle is established considering the seeker's FOV constraint.The boundary time-varying integral barrier Lyapunov function(IBLF)is employed in backstepping design to constrain the body line-of-sight(BLOS)in IEGC system to fit a circular FOV.Then,the nonlinear adaptive controller is designed to estimate the changing aerodynamic parameters.The generalized extended state observer(GESO)is designed to estimate the acceleration of the maneuvering targets and the unmatched time-varying disturbances for improving tracking accuracy.Furthermore,the command filters are used to solve the"differential expansion"problem during the backstepping design.The Lyapunov theory is used to prove the stability of the overall closed-loop IEGC system.Finally,the simulation results validate the integrated system's effectiveness,achieving high accuracy strikes against maneuvering targets. 展开更多
关键词 Integrated estimation guidance and control Circular field-of-view Time-varying integral barrier Lyapunov function Command filtered backstepping control Nonlinear adaptive control Extended state observer
在线阅读 下载PDF
Short-term train arrival delay prediction:a data-driven approach
10
作者 Qingyun Fu Shuxin Ding +3 位作者 Tao Zhang Rongsheng Wang Ping Hu Cunlai Pu 《Railway Sciences》 2024年第4期514-529,共16页
Purpose-To optimize train operations,dispatchers currently rely on experience for quick adjustments when delays occur.However,delay predictions often involve imprecise shifts based on known delay times.Real-time and a... Purpose-To optimize train operations,dispatchers currently rely on experience for quick adjustments when delays occur.However,delay predictions often involve imprecise shifts based on known delay times.Real-time and accurate train delay predictions,facilitated by data-driven neural network models,can significantly reduce dispatcher stress and improve adjustment plans.Leveraging current train operation data,these models enable swift and precise predictions,addressing challenges posed by train delays in high-speed rail networks during unforeseen events.Design/methodology/approach-This paper proposes CBLA-net,a neural network architecture for predicting late arrival times.It combines CNN,Bi-LSTM,and attention mechanisms to extract features,handle time series data,and enhance information utilization.Trained on operational data from the Beijing-Tianjin line,it predicts the late arrival time of a target train at the next station using multidimensional input data from the target and preceding trains.Findings-This study evaluates our model’s predictive performance using two data approaches:one considering full data and another focusing only on late arrivals.Results show precise and rapid predictions.Training with full data achieves aMAEof approximately 0.54 minutes and a RMSEof 0.65 minutes,surpassing the model trained solely on delay data(MAE:is about 1.02 min,RMSE:is about 1.52 min).Despite superior overall performance with full data,the model excels at predicting delays exceeding 15 minutes when trained exclusively on late arrivals.For enhanced adaptability to real-world train operations,training with full data is recommended.Originality/value-This paper introduces a novel neural network model,CBLA-net,for predicting train delay times.It innovatively compares and analyzes the model’s performance using both full data and delay data formats.Additionally,the evaluation of the network’s predictive capabilities considers different scenarios,providing a comprehensive demonstration of the model’s predictive performance. 展开更多
关键词 Train delay prediction Intelligent dispatching command Deep learning Convolutional neural network Long short-term memory Attention mechanism
在线阅读 下载PDF
功率神兽 再度进化 Gryphon Audio贵丰Commander前级、Apex Mono单声道后级
11
作者 晨光 《视听前线》 2024年第12期30-35,共6页
顶级品质的音响器材,由于其昂贵的价格与稀缺性,对于大多数人而言,平日里能够亲自接触并体验的机会实属难得。就在11月,我们来到了典雅音响花园,试听IsoTek EVO3 Super Titan 20A电源处理器,试听现场刚好搭配了Gryphon贵丰的Commander... 顶级品质的音响器材,由于其昂贵的价格与稀缺性,对于大多数人而言,平日里能够亲自接触并体验的机会实属难得。就在11月,我们来到了典雅音响花园,试听IsoTek EVO3 Super Titan 20A电源处理器,试听现场刚好搭配了Gryphon贵丰的Commander指挥官、后级为Gryphon贵丰Apex单声道后级系统。 展开更多
关键词 音响器材 COMMANDER AUDIO 试听 稀缺性
在线阅读 下载PDF
Java事件处理机制中设计模式的分析 被引量:5
12
作者 宋淼 袁兆山 +1 位作者 陈刚 刘奎 《合肥工业大学学报(自然科学版)》 CAS CSCD 2004年第11期1383-1386,共4页
设计模式是具有良好扩展性、健壮性及重用性的软件设计方案,是软件技术的重要研究课题。Java是一门跨平台的语言,适用于开发客户机/服务器式的应用程序。由于Java的跨平台性,使它也适合大型的多主机系统软件开发;同时Java也是一种面向... 设计模式是具有良好扩展性、健壮性及重用性的软件设计方案,是软件技术的重要研究课题。Java是一门跨平台的语言,适用于开发客户机/服务器式的应用程序。由于Java的跨平台性,使它也适合大型的多主机系统软件开发;同时Java也是一种面向对象的语言,在其中体现了许多设计模式的思想。文章介绍了设计模式的概念及Java事件处理机制,并通过对JavaAWT类库的详细分析,从Java的事件处理机制中提取出3种主要的设计模式。 展开更多
关键词 OBSERVER模式 COMMAND模式 DEFAULT ADAPTER模式 事件监听器
在线阅读 下载PDF
面向对象的软件设计模式在配电GIS中的应用 被引量:5
13
作者 肖志峰 龚健雅 +1 位作者 王艳东 翟晓芳 《测绘信息与工程》 2005年第3期3-5,共3页
阐述了一个配电GIS系统的框架体系结构,描述了AbstractFactory模式、Observer模式、Composite模式、Adapter模式、ChainResponsibility模式、Command模式在其开发设计中的运用。
关键词 软件设计模式 面向对象 COMPOSITE模式 配电 OBSERVER模式 COMMAND 应用 GIS系统 体系结构 开发设计
在线阅读 下载PDF
设计模式在电子商务中的应用 被引量:5
14
作者 李杰 李建华 胡韧 《计算机工程》 CAS CSCD 北大核心 2003年第8期100-102,139,共4页
设计模式描述了简单的、可重用的软件解决方案的核心。该文深入探讨了3种典型软件设计模式(MVC,COMMAND,FACADE)在电子商务上的应用,针对电子商务的特点结合这些模式将典型的MVC模式改进为MVCC模式并进一步改进为MVCFC模式,从而构建... 设计模式描述了简单的、可重用的软件解决方案的核心。该文深入探讨了3种典型软件设计模式(MVC,COMMAND,FACADE)在电子商务上的应用,针对电子商务的特点结合这些模式将典型的MVC模式改进为MVCC模式并进一步改进为MVCFC模式,从而构建层次分明、结构清晰、重用性好的电子商务系统。 展开更多
关键词 设计模式 电子商务 软件重用 MODEL-VIEW-CONTROLLER COMMAND FACADE
在线阅读 下载PDF
基于AHP的威胁评估与排序模型研究 被引量:31
15
作者 唐雪松 郭立红 陈长喜 《微计算机信息》 北大核心 2006年第09X期35-38,共4页
层次分析法(AnalyticHierarchyProcess,简称AHP)把一个复杂问题表示为有序的递阶层次结构,通过定性判断和定量计算,将经验判断给予量化,对决策方案进行排序,是一种定性分析与定量分析相结合的决策分析方法,适用于多准则决策问题。通过... 层次分析法(AnalyticHierarchyProcess,简称AHP)把一个复杂问题表示为有序的递阶层次结构,通过定性判断和定量计算,将经验判断给予量化,对决策方案进行排序,是一种定性分析与定量分析相结合的决策分析方法,适用于多准则决策问题。通过仿真实验用AHP根据威胁程度的大小对敌空袭目标进行排序,介绍了威胁评估和排序的求解过程,以此提供敌空袭目标对我保卫目标或区域所构成的威胁等级。该方法有效地解决了对敌空中目标威胁评估与排序问题。 展开更多
关键词 层次分析法 威胁评估 威胁排序 COMMAND CONTROL COMMUNICATION & INTELLIGENCE
在线阅读 下载PDF
基于TCL的电路板原理图自动审查平台建设 被引量:2
16
作者 田野 赵保华 屈玉贵 《电子与信息学报》 EI CSCD 北大核心 2005年第1期158-160,共3页
该文提出了一种用TCL语言作为审查脚本语言构造原理图审查系统的系统框架。在该系统中,利用TCL语言的扩展性,制定了一套应用于原理图通用数据结构的TCL扩展命令,并在此基础上构建原理图规则库和自动审查执行器,实现了原理图的自动审查。
关键词 TCL(Tool COMMAND Language) 电路板原理图设计 通用数据结构 自动审查
在线阅读 下载PDF
基于GCL语言的测试用例生成方法 被引量:1
17
作者 丁佐华 JeffSanders +2 位作者 江明月 张娜 蒲戈光 《计算机学报》 EI CSCD 北大核心 2014年第12期2492-2504,共13页
提出一种基于GCL语言生成程序测试用例的形式化方法.程序的语义为测试用例的生成提供了基本框架,而由Hoare等人提供的规则保证了用例的正确性.作者的这种方法可被认为是一种严格的,自动生成测试用例的方法.这种方法的优点在于:所获得的... 提出一种基于GCL语言生成程序测试用例的形式化方法.程序的语义为测试用例的生成提供了基本框架,而由Hoare等人提供的规则保证了用例的正确性.作者的这种方法可被认为是一种严格的,自动生成测试用例的方法.这种方法的优点在于:所获得的测试用例都是可行的,在测试用例生成过程中可以避免状态爆炸问题,而且该方法可以延拓到任何目标语言.据此开发了一个基于Haskell语言的原型工具来支持作者的方法. 展开更多
关键词 测试用例 Guarded—Command—Language 执行树 条件计算 软件测试
在线阅读 下载PDF
两种设计模式及其在公众监督系统中的应用 被引量:3
18
作者 尚鲜连 陈静 《计算机与现代化》 2008年第7期40-42,共3页
设计模式描述了简单、可复用的软件解决方案的核心。本文对电子政务中公众监督系统的现状进行了研究,深入探讨了设计模式中State模式与Command模式的原理。针对公众监督系统设计中可复用性差和难以维护与扩展的不足,结合这些模式提出了... 设计模式描述了简单、可复用的软件解决方案的核心。本文对电子政务中公众监督系统的现状进行了研究,深入探讨了设计模式中State模式与Command模式的原理。针对公众监督系统设计中可复用性差和难以维护与扩展的不足,结合这些模式提出了一种将State模式与Command模式相结合的设计思路,并将该组合模式应用于公众监督系统的设计中,从而构建层次分明、结构清晰、重用性好的公众监督系统。 展开更多
关键词 设计模式 STATE模式 COMMAND模式 公众监督系统
在线阅读 下载PDF
在J2EE架构中数据对象的设计与实现 被引量:1
19
作者 王纲 周国红 +2 位作者 付长青 杨燕萍 王奭 《河北科技师范学院学报》 CAS 2007年第3期54-58,共5页
从数据流角度出发,基于MVC模式设计要求,对数据对象在不同层之间的传输和转换问题进行了深入分析,设计出基于对象化数据在不同层之间的实现思路,基于网络传输和跨平台性考虑,提出了VO和XAO的解决方案,并采用了COMMAND模式进行设计实现。
关键词 J2EE平台 数据传输和转换 COMMAND模式
在线阅读 下载PDF
基于反射的Command模式实现Undo/Redo 被引量:2
20
作者 张兴亮 《计算机应用》 CSCD 北大核心 2010年第A01期233-234,共2页
针对经典Command模式在实现Undo/Redo功能时的两个缺陷,提出了基于反射的Command模式实现Undo/Redo的设计思路和实现方法,给出了该方法的数据模型,说明了事务处理的过程。
关键词 反射 COMMAND模式 设计模式 UNDO/REDO
在线阅读 下载PDF
上一页 1 2 32 下一页 到第
使用帮助 返回顶部