相似文献/References:
[1]蒋恩松 肖辉军 孙刘杰 熊清廉.基于机器视觉的套印误差自动检测系统设计[J].计算机技术与发展,2008,(07):173.
JIANG En-song,XIAO Hui-jun,SUN Liu-jie,et al.Design of Automatic Detecting Printing Registration Deviation System Based on Machine Vision[J].,2008,(06):173.
[2]陈磊 张家栋 霍凯.列车振动检测记录仪的研制[J].计算机技术与发展,2007,(02):181.
CHEN Lei,ZHANG Jia-dong,HUO Kai.Research of Vibration Detecting Recorder for Running Vehicles[J].,2007,(06):181.
[3]邢长明 刘方爱 杨林.无线局域网中非法设备检测方案的设计与实现[J].计算机技术与发展,2006,(10):128.
XING Chang-ming,LIU Fang-ai,YANG Lin.A Design and Realization of a Rogue - Device Detecting Project in WLAN[J].,2006,(06):128.
[4]孙科学 汤吉波 史学良.基于NiosⅡ的高性能电网谐波表的研制[J].计算机技术与发展,2012,(07):219.
SUN Ke-xue,TANG Ji-bo,SHI Xue-liang.High-performance Electrical Network Harmonic Monitoring System Based on Nios Ⅱ[J].,2012,(06):219.
[5]朱俚治.病毒检测技术的研究与0.5级环[J].计算机技术与发展,2012,(09):225.
ZHU Li-zhi.Research on Detecting Virus and 0.5 Level Ring[J].,2012,(06):225.
[6]韩玲,蔡皖东.面向Microsoft Virtual PC的虚拟机远程检测方法[J].计算机技术与发展,2013,(12):134.
HAN Ling,CAI Wan-dong.Remote Detection Method Oriented Microsoft Virtual PC[J].,2013,(06):134.
[7]平程,蔡皖东.Android系统隐藏技术及检测方法[J].计算机技术与发展,2014,24(05):142.
PING Cheng,CAI Wan-dong.Hidden Technology and Method of Detection in Android System[J].,2014,24(06):142.
[8]徐建,吴烨虹,程晶晶. 移动僵尸网络中数据流的采集与分析[J].计算机技术与发展,2016,26(11):101.
XU Jian,WU Ye-hong,CHENG Jing-jing. Collection and Analysis of Data Flow in Mobile Botnet[J].,2016,26(06):101.
[9]董峰,张秋霞. 一种恶意节点攻击的无线传感器网络入侵检测方法[J].计算机技术与发展,2017,27(02):86.
DONG Feng,ZHANG Qiu-xia. An Intrusion Detection Method for Wireless Sensor Network of Malicious Node Attack[J].,2017,27(06):86.
[10]李晓峰,邢金明.基于条件随机场的视频运动目标可靠性检测方法[J].计算机技术与发展,2020,30(07):60.[doi:10. 3969 / j. issn. 1673-629X. 2020. 07. 014]
LI Xiao-feng,XING Jin-ming.Reliability Detection Method of Video Moving Target Based on Conditional Random Field[J].,2020,30(06):60.[doi:10. 3969 / j. issn. 1673-629X. 2020. 07. 014]