This paper mainly studies the change rule of center temperature of welding zone in backwelding furnace under different set temperature and transfer rate conditions, and searches for appropriate temperature and rate to...
详细信息
mathematical function is an essential part of numerical program, and it is also the key factor that affects the precision and performance of a program. In the design of mathematical functions, in order to satisfy most...
详细信息
By establishing a mathematical model, the intelligent RGV scheduling scheme is optimized to design an efficient and stable intelligent RGV simulation scheduling system. This paper studies two different situations, inc...
详细信息
The classical computer is restricted by Moore's law and other factors into the development bottleneck, quantum computer by virtue of its natural acceleration advantage into the field of vision. Quantum computing c...
详细信息
Network attack and defense confrontation is essentially a game process between unequal subjects on both sides of attack and defense. There are some defects in the prior hypothesis that the subject status of both sides...
详细信息
In the research of imbalanced data classification, the resampling effect of the existing resampling and random forest combination technology is greatly affected by the characteristic dimension of the training set, res...
详细信息
The'Principles of Computer Organization' is the core basic course for the construction of computer hardware courses. In this paper, it analyzes the characteristics of the 'Principles of Computer Organizati...
详细信息
To address the problem that traditional network defense techniques are difficult to cope with scanning attacks launched by internal attackers, this paper proposes a Virtual Network Topology Deception Defense mechanism...
详细信息
The taint propagation strategy is the core of the taint analysis technology. When the taint analysis toolsanalyses the target program, it needs to mark the target data according to the formulatedtaint propagation stra...
Network topology construction is one of the basic means to study the target network. Whether it is the discovery of vital nodes, IP location or network characteristics mining, a complete and accurate network topology ...
详细信息
暂无评论