您现在的位置: 首页> 研究主题> Log

Log

Log的相关文献在1994年到2022年内共计360篇,主要集中在自动化技术、计算机技术、水路运输、肿瘤学 等领域,其中期刊论文205篇、会议论文2篇、专利文献153篇;相关期刊125种,包括国际木业、影视制作、电子产品世界等; 相关会议2种,包括第一届中国传感器网络学术会议(CWSN 2007)、2002年全国计算机体系结构学术会议等;Log的相关文献由604位作者贡献,包括祁斌、周羽欢、刘方琦等。

Log—发文量

期刊论文>

论文:205 占比:56.94%

会议论文>

论文:2 占比:0.56%

专利文献>

论文:153 占比:42.50%

总计:360篇

Log—发文趋势图

Log

-研究学者

  • 祁斌
  • 周羽欢
  • 刘方琦
  • 李源
  • 彦楠
  • 李海涛
  • 杨晓东
  • 张强
  • 俞斌
  • 吴国强
  • 期刊论文
  • 会议论文
  • 专利文献

搜索

排序:

年份

关键词

    • 孙庆; 邵科君; 周波
    • 摘要: 随着汽车技术的不断发展,汽车不仅仅是简单的代步工具,更是消费者的第二个"家"。为提高驾驶员和乘客的行车舒适性,整车电气化成为目前主流的发展趋势,座椅加热功能应运而生,该功能是控制座椅内置加热丝的温度,依照收到MMI、TBOX等相关报文,对驾驶员座椅总成&乘客座椅总成加热作ON/OFF控制。加热模块在整车电检和使用过程中会存在一些电检或功能问题,本文主要对主机厂汽车座椅加热模块的软硬件故障模式进行探究,期望能为问题的解决提供一些帮助。
    • Peng Hui Li; Jie Xu; Zhong Yi Xu; Su Chen; Bo Wei Niu; Jie Yin; Xiao Feng Sun; Hao Liang Lan; Lu Lu Chen
    • 摘要: At present,the severe network security situation has put forward high requirements for network security defense technology.In order to automate botnet threat warning,this paper researches the types and characteristics of Botnet.Botnet has special characteristics in attributes such as packets,attack time interval,and packet size.In this paper,the attack data is annotated by means of string recognition and expert screening.The attack features are extracted from the labeled attack data,and then use K-means for cluster analysis.The clustering results show that the same attack data has its unique characteristics,and the automatic identification of network attacks is realized based on these characteristics.At the same time,based on the collection and attribute extraction of Botnet attack data,this paper uses RF,GBM,XGBOOST and other machine learning models to test the warning results,and automatically analyzes the attack by importing attack data.In the early warning analysis results,the accuracy rates of different models are obtained.Through the descriptive values of the three accuracy rates of Accuracy,Precision,and F1_Score,the early warning effect of each model can be comprehensively displayed.Among the five algorithms used in this paper,three have an accuracy rate of over 90%.The three models with the highest accuracy are used in the early warning model.The research shows that cyberattacks can be accurately predicted.When this technology is applied to the protection system,accurate early warning can be given before a network attack is launched.
    • 陈晓楠; 蒋辉; 刘晓凯; 王凯欣
    • 摘要: 针对亚实性肺结节(SSN)边缘模糊、结构复杂、区域亮度不均等问题,传统的活动轮廓模型(ACM)方法难以达到高精度的分割结果。因此,提出一种优化的LoG算子和因子分解结合的集成ACM分割算法。用高斯拉普拉斯算子(LoG)处理肺实质图像,对算子进行优化并构建能量项,以加强边界并增强区域亮度;以像素值作为描述特征构建因子分解能量项,使曲线演变到目标边缘;将LoG能量项和因子分解能量项集成到LGIF模型中对SSN分割。实验结果证实,该算法模型对SSN的分割更有效。
    • 裴云成; 贝前程; 刘海英; 张绍杰
    • 摘要: 将机器视觉技术应用在距离检测中能更好地提高检测的精度,特别是在某些重要场所和恶劣环境下,机器视觉技术能更好地代替人类工作.将双目视觉技术与图像处理技术相结合,先应用高斯拉普拉斯算子(Laplacian of Gaussian,LOG)对采集的图像进行预处理,获得清晰的边缘信息,然后根据双目立体视觉原理,获取图像边缘点的坐标,最后根据空间点的距离公式获得两物体边缘点距离集合.筛选出其中的最短距离即为两物体间安全距离的判断依据,此方法也可用于输由线路周围障碍物安全距离的检测.
    • Jeonghoon Park; Jinsu Kim; B.B.Gupta; Namje Park
    • 摘要: The rapid advancement of IT technology has enabled the quick discovery,sharing and collection of quality information,but has also increased cyberattacks at a fast pace at the same time.There exists no means to block these cyberattacks completely,and all security policies need to consider the possibility of external attacks.Therefore,it is crucial to reduce external attacks through preventative measures.In general,since routers located in the upper part of a firewall can hardly be protected by security systems,they are exposed to numerous unblocked cyberattacks.Routers block unnecessary services and accept necessary ones while taking appropriate measures to reduce vulnerability,block unauthorized access,and generate relevant logs.Most logs created through unauthorized access are caused by SSH brute-force attacks,and therefore IP data of the attack can be collected through the logs.This paper proposes a model to detect SSH brute-force attacks through their logs,collect their IP address,and control access from that IP address.In this paper,we present a model that extracts and fragments the specific data required from the packets of collected routers in order to detect indiscriminate SSH input attacks.To do so,the model multiplies a user’s access records in each packet by weights and adds them to the blacklist according to a final calculated result value.In addition,the model can specify the internal IP of an attack attempt and defend against the first 29 destination IP addresses attempting the attack.
    • 胡宏强
    • 摘要: 2014年1月17日,山西五台县的周玮出现在了《最强大脑》节目里.他只用1 min就说出了16位数字1 391 237 759 766 345的14次方根是12.0(约等于),震惊全场,也获得了“中国雨人”的称号.周玮是否具有超能力,我们姑且不谈,其实这样的计算我们常人也可以做到,用到的知识就是高中数学必修1中的对数运算知识.高一的学生对于对数的计算往往没有很大的兴趣,究其原因除了对数的运算性质较多,觉得没有实用性也是重要的原因.下面我们就用对数运算性质来揭秘“中国雨人”的神奇速算.
    • 小路(文/图)
    • 摘要: 这是笔者第三次体验德国Trigon的合并机,前两次分别是型号为EXXACT和EXXCEED的2台合并机,而这次是EPILOG,Trigon的合并机旗舰。目前Trigon旗下就只有这3款合并机,换言之就是笔者体验了所有的Trigon合并机。
  • 查看更多

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号