期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
STM32控制器烧录工具读写option bytes的实现 被引量:1
1
作者 陈景郁 朱洪雷 《机电技术》 2019年第6期30-32,共3页
随着物联网的发展,嵌入式智能设备对微型控制器的需求越来越高。意法半导体(ST)公司推出的STM23系列控制器,性价比高,稳定性好,是比较常见的选择。option bytes是STM32系列控制器中特有的字节选项,可以对系统功能进行特殊的个性化配置... 随着物联网的发展,嵌入式智能设备对微型控制器的需求越来越高。意法半导体(ST)公司推出的STM23系列控制器,性价比高,稳定性好,是比较常见的选择。option bytes是STM32系列控制器中特有的字节选项,可以对系统功能进行特殊的个性化配置。在产品生产过程中,随着芯片固件烧录后,option bytes也需要在出厂前完成配置。文中介绍了一种方法,改造STM32烧录器工具pystlink,实现了对option bytes的读写功能,应用到产品量产中,简单易操作。 展开更多
关键词 STM32控制器 烧录工具 option bytes pystlink
在线阅读 下载PDF
Chinese Scripts:From Oracle Bones to Computer Bytes
2
《China & The World Cultural Exchange》 2002年第6期30-31,共2页
Last August, a well-prepared exhibition titled "Chinese Scripts: From Oracle Bones to Computer Bytes" opened in Beijing-based Chinese Modern Literature Museum. This exhibition toured Egypt last October as a ... Last August, a well-prepared exhibition titled "Chinese Scripts: From Oracle Bones to Computer Bytes" opened in Beijing-based Chinese Modern Literature Museum. This exhibition toured Egypt last October as a cultural event in celebration of the opening of China Cultural Center in Egypt. After that, it will be displayed in France, Malta and the Republic of Korea. 展开更多
关键词 ORACLE In Chinese Scripts:From Oracle Bones to Computer bytes
在线阅读 下载PDF
Rights Over Bytes: Intellectual property protection faces new challenges in the Al era
3
作者 Tao Zihui 《Beijing Review》 2025年第15期30-31,共2页
The AI revolution is altering the innovation ecosystem at an unprecedented pace.Breakthroughs in generative AI,big data analytics,autonomous driving,and other fields have rendered conventional IP frameworks increasing... The AI revolution is altering the innovation ecosystem at an unprecedented pace.Breakthroughs in generative AI,big data analytics,autonomous driving,and other fields have rendered conventional IP frameworks increasingly inadequate.A central challenge confronting global IP systems is how to safeguard innovators’rights while fostering technological progress. 展开更多
关键词 innovation innovation ecosystem ECOSYSTEM generative aibig data analyticsautonomous drivingand bytes RIGHTS ai fostering technological progress
原文传递
基于YOLOv5-Byte面向清洁船的多目标漂浮垃圾追踪算法
4
作者 袁和平 周波 刘必劲 《中国舰船研究》 北大核心 2025年第3期327-338,共12页
[目的]针对清洁船在自主打捞作业过程中因平台晃动、距离较远造成的目标小等复杂场景引起的追踪准确率低、目标身份编号(ID)易切换等问题,提出一种基于改进YOLOv5-Byte的多目标漂浮垃圾追踪算法。[方法]首先,引入Byte数据关联模型与YOL... [目的]针对清洁船在自主打捞作业过程中因平台晃动、距离较远造成的目标小等复杂场景引起的追踪准确率低、目标身份编号(ID)易切换等问题,提出一种基于改进YOLOv5-Byte的多目标漂浮垃圾追踪算法。[方法]首先,引入Byte数据关联模型与YOLOv5检测器融合,实现多目标追踪(MOT)算法的构建;其次,针对YOLOv5中完整交并比(CIoU)对小目标敏感的问题,对边界框高斯建模,提出归一化Wasserstein距离度量;然后,引入平衡因子来调节CIoU和归一化Wasserstein距离度量在损失函数中的贡献度,并调节检测器对小目标敏感度;最后,在Byte数据关联模型中将交并比(IoU)以幂指数形式引入可调节超参数,降低目标因关联值低而被丢弃的风险。[结果]基于水面漂浮垃圾数据集的实验结果表明,与算法改进前相比,识别平均数比率(IDF1)提高11.5%、多目标追踪准确率(MOTA)提高8.7%,目标身份编号切换次数(IDs)下降7次。[结论]所提算法实现了水面多个小目标的准确追踪,为清洁船实现自主打捞技术提供了参考。 展开更多
关键词 清洁船 污染监测 目标跟踪 计算机视觉 目标检测 YOLOv5 Byte数据关联 打捞 垃圾
在线阅读 下载PDF
Modeling and Implementation of a Data Security and Protection Medium Using the Generated Key Based on Electromagnetic Wave Propagation Theories
5
作者 Vincent Mbonigaba Fulgence Nahayo +3 位作者 Octave Moutsinga Dieudonné Okalas-Ossami Romeo Nibitanga Thérence Niyonsaba 《Journal of Computer and Communications》 2024年第9期131-140,共10页
Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide ... Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide a security service and protect the privacy of users by providing protection against attacks such as identity theft, denial of service, eavesdropping and unauthorised access to personal and sensitive data. It is therefore necessary to find a robust method of using the key that is effective in protecting and preventing data tampering. In this paper, we design and implement a security and data protection method using a key generated on the basis of electromagnetic wave propagation theories. Modelling and implementation of a data security and protection method using a key generated on the basis of electromagnetic wave propagation theories. 展开更多
关键词 MODELING Security CRYPTOGRAPHY Algorithm CODING Quantum Post bytes System WAVES
在线阅读 下载PDF
一种Byte查找第K个元素的算法研究 被引量:1
6
作者 班志杰 高光来 闫晓东 《内蒙古大学学报(自然科学版)》 CAS CSCD 北大核心 2004年第3期322-324,共3页
查找第K个元素的问题在计算机查找技术中占有十分重要的地位,这个问题的最直接解法是先将序列排序,从而能得到第K个元素,最少需O(nlogn)次比较,即时间复杂度为O(nlogn).比较好的方法是采用分治策略解决该问题,但其最坏时间复杂度为O(n2)... 查找第K个元素的问题在计算机查找技术中占有十分重要的地位,这个问题的最直接解法是先将序列排序,从而能得到第K个元素,最少需O(nlogn)次比较,即时间复杂度为O(nlogn).比较好的方法是采用分治策略解决该问题,但其最坏时间复杂度为O(n2),平均时间复杂度为O(2n)〔1〕.本文提出一种Byte解决第K个元素问题的算法,该算法的平均时间复杂度为O(n+n/255),优于以前对该问题的求解方法〔1〕,而且该算法可以适用于由整数、浮点数、无符号整型数、双精度数和字符型数构成的超大数集. 展开更多
关键词 Byte查找第K个元素的算法 平均时间复杂度 算法
在线阅读 下载PDF
简谈VB中用数据库存取图片的简便方法 被引量:2
7
作者 李利平 《计算机教育》 2010年第8期125-128,共4页
VB数据库中图像数据的存取对初学者来说是个难点,文章总结了绑定图片控件、存储图片文件路径、利用PropertyBag对象与Byte数组中转三种较为简便的方法以供初学者参考。
关键词 VB DATA控件 数据库 图片 存取 路径 PropertyBag Byte数组
在线阅读 下载PDF
互联网4byte自治域标识过渡研究
8
作者 陆俊秀 朱韵成 陈茂科 《电信科学》 北大核心 2008年第3期65-68,共4页
互联网将逐渐向4byte的自治域号码过渡。过渡过程中,新、旧两种路由器的互操作性成为网络运营商十分关注的问题。本文就过渡过程对路由收敛性和路由策略的影响进行了深入的分析,并通过试验床进行了验证。针对这些影响,本文提出了相应的... 互联网将逐渐向4byte的自治域号码过渡。过渡过程中,新、旧两种路由器的互操作性成为网络运营商十分关注的问题。本文就过渡过程对路由收敛性和路由策略的影响进行了深入的分析,并通过试验床进行了验证。针对这些影响,本文提出了相应的应对措施。此外,针对4byte自治域号码路由,作者设计的故障排查服务系统,能够方便系统管理员对路由故障进行排查和诊断。 展开更多
关键词 4byte自治域号码 过渡 路由收敛性 路由策略 故障诊断
在线阅读 下载PDF
中文报文Byte级列换位
9
作者 游荣彦 《华南师范大学学报(自然科学版)》 CAS 1997年第2期32-36,共5页
本文给出中文报文Byte级列换位的算法,显示了该算法具有C.Shannon所指的扩散与混乱的能力。
关键词 加密算法 计算机密码学 中文报文 Byte级列换位
在线阅读 下载PDF
Improved image captioning with subword units training and transformer 被引量:1
10
作者 Cai Qiang Li Jing +1 位作者 Li Haisheng Zuo Min 《High Technology Letters》 EI CAS 2020年第2期211-216,共6页
Image captioning models typically operate with a fixed vocabulary,but captioning is an open-vocabulary problem.Existing work addresses the image captioning of out-of-vocabulary words by labeling it as unknown in a dic... Image captioning models typically operate with a fixed vocabulary,but captioning is an open-vocabulary problem.Existing work addresses the image captioning of out-of-vocabulary words by labeling it as unknown in a dictionary.In addition,recurrent neural network(RNN)and its variants used in the caption task have become a bottleneck for their generation quality and training time cost.To address these 2 essential problems,a simpler but more effective approach is proposed for generating open-vocabulary caption,long short-term memory(LSTM)unit is replaced with transformer as decoder for better caption quality and less training time.The effectiveness of different word segmentation vocabulary and generation improvement of transformer over LSTM is discussed and it is proved that the improved models achieve state-of-the-art performance for the MSCOCO2014 image captioning tasks over a back-off dictionary baseline model. 展开更多
关键词 image captioning transformer BYTE PAIR encoding(BPE) REINFORCEMENT learning
在线阅读 下载PDF
VB中资源文件的创建及使用 被引量:2
11
作者 罗祥远 《湖南工业职业技术学院学报》 2001年第2期12-14,共3页
在发布 V B应用程序时 ,我们往往对一些不是程序本身但又必须要的一些文件的存放位置感到麻烦 ,或者在制作双语言(比如中英文 )版本程序时感到不方便。本文详细介绍了资源文件的创建方法和使用技巧 。
关键词 资源文件 工程文件 存储器 Byte数组 VB应用程序 创建方法 使用技巧
在线阅读 下载PDF
巧用VB的Byte型变量实现与单片机通讯 被引量:3
12
作者 陈海云 《微计算机信息》 2000年第1期21-22,共2页
本文分析Visual BASIC串行通讯控件的特点,提出利用 AscB()函数和Byte型变量处理通讯数据,消除了使用String型变量只能处理 ASCII码为 00H— 7FH的文本字符的缺陷,真正实现Windows环... 本文分析Visual BASIC串行通讯控件的特点,提出利用 AscB()函数和Byte型变量处理通讯数据,消除了使用String型变量只能处理 ASCII码为 00H— 7FH的文本字符的缺陷,真正实现Windows环境下PC机与单片机的通讯。 展开更多
关键词 PC机 单片机 通讯 VB语言 Byte型变量
在线阅读 下载PDF
多接口显示器EDID快速烧录方法 被引量:1
13
作者 黄玉琴 《福建电脑》 2017年第4期157-158,99,共3页
为实现显示器多接口如VGA、DVI、HDMI等接口的显示器数据EDID数据在线生产过程中达到快速烧录,以节省工时,提高产能。本论文提出一种快速烧录的方法,新的烧录方式是将这128Byte的EDID数据与显示器功能的软体Code结合一起存储在主板的Fla... 为实现显示器多接口如VGA、DVI、HDMI等接口的显示器数据EDID数据在线生产过程中达到快速烧录,以节省工时,提高产能。本论文提出一种快速烧录的方法,新的烧录方式是将这128Byte的EDID数据与显示器功能的软体Code结合一起存储在主板的Flash IC内,然后到生产线上组装后第一次上电时,这128Byte的共用EDID内容会自动烧录到每台显示器上,然后线上的人员只需烧录实时变更的生产序列号,周别等19Byte的EDID数据内容给每台显示器。 展开更多
关键词 EDID 19Byte 多接口 快速烧录 生产序列号
在线阅读 下载PDF
Performance improvement of software component with partial evaluation
14
作者 毛宏燕 黄林鹏 李明禄 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第1期95-99,共5页
To avoid the complexity and inefficiency for specific applications of the current software architecture, a novel approach using partial evaluation is proposed to improve the running performance of components. The gene... To avoid the complexity and inefficiency for specific applications of the current software architecture, a novel approach using partial evaluation is proposed to improve the running performance of components. The generic program was specialized into domain-specific realization for the known knowledge and environments. The syntax and semantic(adj.) were analyzed based on byte code instruction sequences, and partial evaluation rules depicted how to perform the specialization. The partial evaluation for object-oriented programs was implemented. The experimental results show that partial evaluation is effective to speed up the running efficiency. The more generality and scalability can be obtained by the integration of partial evaluation with the favorable design mechanisms and compiler optimization technology. 展开更多
关键词 partial evaluation running efficiency COMPONENT byte code instruction sequence
在线阅读 下载PDF
Byte-Level Function-Associated Method for Malware Detection
15
作者 Jingwei Hao Senlin Luo Limin Pan 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期719-734,共16页
The byte stream is widely used in malware detection due to its independence of reverse engineering.However,existing methods based on the byte stream implement an indiscriminate feature extraction strategy,which ignore... The byte stream is widely used in malware detection due to its independence of reverse engineering.However,existing methods based on the byte stream implement an indiscriminate feature extraction strategy,which ignores the byte function difference in different segments and fails to achieve targeted feature extraction for various byte semantic representation modes,resulting in byte semantic confusion.To address this issue,an enhanced adversarial byte function associated method for malware backdoor attack is proposed in this paper by categorizing various function bytes into three functions involving structure,code,and data.The Minhash algorithm,grayscale mapping,and state transition probability statistics are then used to capture byte semantics from the perspectives of text signature,spatial structure,and statistical aspects,respectively,to increase the accuracy of byte semantic representation.Finally,the three-channel malware feature image is constructed based on different function byte semantics,and a convolutional neural network is applied for detection.Experiments on multiple data sets from 2018 to 2021 show that the method can effectively combine byte functions to achieve targeted feature extraction,avoid byte semantic confusion,and improve the accuracy of malware detection. 展开更多
关键词 Byte function malware backdoor attack semantic representation model visualization
在线阅读 下载PDF
万物有色
16
作者 马迪 《今日中国》 2021年第11期76-76,共1页
就像每一个装修新手一样,我在面对着厚厚一打墙漆色卡的时候才意识到:我们身边居然有这么多种色彩可供选择,而且每一种都有自己的名字……事实上,自然界中颜色有无数种,即使在有限的电子世界中,红绿蓝三基色各用1个BYTE(字节,范围是0-2... 就像每一个装修新手一样,我在面对着厚厚一打墙漆色卡的时候才意识到:我们身边居然有这么多种色彩可供选择,而且每一种都有自己的名字……事实上,自然界中颜色有无数种,即使在有限的电子世界中,红绿蓝三基色各用1个BYTE(字节,范围是0-255)来表示,也有16777216种颜色之多。作为一种“好色”的视觉动物,从光照进眼睛的那一刻起。 展开更多
关键词 色卡 红绿蓝三基色 BYTE
在线阅读 下载PDF
联合Transformer与BYTE数据关联的多目标实时跟踪算法 被引量:7
17
作者 潘昊 刘翔 +1 位作者 赵静文 张星 《激光与光电子学进展》 CSCD 北大核心 2023年第6期144-151,共8页
针对复杂环境下多目标跟踪过程出现的轨迹漏检、误检及身份切换等问题,提出一种基于改进YOLOX和BYTE数据关联方法的多目标跟踪算法.首先,为了增强YOLOX在复杂环境下的目标检测能力,将YOLOX骨干网络与Vision Transformer结合,增强网络的... 针对复杂环境下多目标跟踪过程出现的轨迹漏检、误检及身份切换等问题,提出一种基于改进YOLOX和BYTE数据关联方法的多目标跟踪算法.首先,为了增强YOLOX在复杂环境下的目标检测能力,将YOLOX骨干网络与Vision Transformer结合,增强网络的局部特征提取能力,同时加入α-GIoU损失函数,进一步增加网络边界框的回归精度;其次,为了满足算法实时性要求,采用BYTE数据关联方法,摒弃传统特征重识别(Re-ID)网络,进一步提高了多目标跟踪算法的速度;最后,为了改善光照、遮挡等复杂环境下的跟踪问题,采用更加适应非线性系统的扩展卡尔曼滤波,提高了网络在复杂场景下对跟踪轨迹的预测精度.实验结果表明:所提算法对MOT17数据集的multiple object tracking accuracy(MOTA)、identity F1-measure(IDF1)指标分别为73.0%、70.2%,相较于目前最优的ByteTrack,分别提升了 1.3个百分点、2.1个百分点,number of identity switches(IDSW)则减少了 3.7%;同时所提算法取得了 51.2 frame/s的跟踪速度,满足系统实时性要求. 展开更多
关键词 多目标跟踪 YOLOX BYTE TRANSFORMER 复杂场景
原文传递
Chaos block cipher for wireless sensor network 被引量:6
18
作者 CHEN Shuai ZHONG XianXin WU ZhengZhong 《Science in China(Series F)》 2008年第8期1055-1063,共9页
New block cipher algorithm in single byte for wireless sensor network with excellence of many cipher algorithms is studied. The child keys are generated through the developed discrete Logistic mapping, and the Feistel... New block cipher algorithm in single byte for wireless sensor network with excellence of many cipher algorithms is studied. The child keys are generated through the developed discrete Logistic mapping, and the Feistel encrypting function with discrete chaos operation is constructed. The single byte block is encrypted and decrypted through one turn permutation, being divided into two semi-byte, quadri- Feistel structural operation, and one turn permutation again. The amount of keys may be variable with the turns of Feistel structural operation. The random and security of the child key was proven, and the experiment for the block cipher in wireless sensor network was completed. The result indicates that the algorithm is more secure and the chaos block cipher in single byte is feasible for wireless sensor network. 展开更多
关键词 block cipher wireless sensor network discrete chaos encryption function single byte
原文传递
Method of data cleaning for network traffic classification 被引量:1
19
作者 WANG Ruo-yu LIU Zhen ZHANG Ling 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第3期35-45,共11页
Network traffic classification aims at identifying the application types of network packets. It is important for Internet service providers (ISPs) to manage bandwidth resources and ensure the quality of service for ... Network traffic classification aims at identifying the application types of network packets. It is important for Internet service providers (ISPs) to manage bandwidth resources and ensure the quality of service for different network applications However, most classification techniques using machine learning only focus on high flow accuracy and ignore byte accuracy. The classifier would obtain low classification performance for elephant flows as the imbalance between elephant flows and mice flows on Internet. The elephant flows, however, consume much more bandwidth than mice flows. When the classifier is deployed for traffic policing, the network management system cannot penalize elephant flows and avoid network congestion effectively. This article explores the factors related to low byte accuracy, and secondly, it presents a new traffic classification method to improve byte accuracy at the aid of data cleaning. Experiments are carried out on three groups of real-world traffic datasets, and the method is compared with existing work on the performance of improving byte accuracy. Experiment shows that byte accuracy increased by about 22.31% on average. The method outperforms the existing one in most cases. 展开更多
关键词 network traffic classification byte accuracy elephant flow mice flow machine learning
原文传递
Performance Analysis of Two Ethernet over E1 Schemes
20
作者 陈文涛 金德鹏 曾烈光 《Tsinghua Science and Technology》 SCIE EI CAS 2007年第1期70-76,共7页
The Ethernet over E1 approach, which takes advantage of widely deployed telecom networks, is an efficient and economical way to interconnect two Ethernets in different regions. Two Ethemet over E1 schemes, namely a by... The Ethernet over E1 approach, which takes advantage of widely deployed telecom networks, is an efficient and economical way to interconnect two Ethernets in different regions. Two Ethemet over E1 schemes, namely a byte granularity scheme and a frame granularity scheme are discussed. The byte granularity scheme partitions Ethernet frames into several pieces for transmission and has a strict requirement on the maximum delay difference of multiple E1 links. To solve this problem, the newly proposed frame granularity scheme transmits separately each frame through E1 links without any partitioning. The architecture designs of both schemes are presented. This paper evaluates the throughput and delay performances of both schemes, both analytically from results calculated from delay models and using test results from field programmable gate array (FPGA) implementation. Although the frame granularity scheme has a slightly worse delay performance, it has a higher throughput, and is the only choice able to overcome large delay differences of the E1 links. 展开更多
关键词 Ethernet over El byte granularity frame granularity generic frame procedure (GFP) throughput delay
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部