>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到知识库 approach相关记录2864条 . 查询时间(0.343 秒)
Accurate estimation of tree biomass is required for accounting for and monitoring forest carbon stocking. Allometric biomass equations constructed by classical statistical methods are widely used to p...
Aquilaria malaccensis Lam. is an important commercial tree species of Bangladesh. This species is widely planted for the increased demand for an essential oil locally knows as "Agar". A nondestructive...
Gene copy number variation is frequent in plant genomes of various species, but the impact of such gene dosage variation on morphological traits is poorly understood. We used a large population of Pop...
Porous frozen material with a certain initial porosity was prepared to explore its influence on freeze-drying experimentally. Soluble coffee was selected as the solute in aqueous solution and liquid n...
The aroma profile of raw pu’er tea (RPT) depends on its storage duration (2–10 years) and storage conditions (wet-hot or dry-cold environment). We analyzed the major odorants of RPT samples by perform...
Natural durability within a timber species can be variable. Hence efficient assessments of natural durability are required to ensure quality either through tree breeding or segregation during producti...
Process-based terrestrial ecosystem models are increasingly being used to predict carbon (C) cycling in forest ecosystems. Given the complexity of ecosystems, these models inevitably have certain defi...
Whereas it is widely deemed impossible to overcome the optimality of the one-time pad (OTP) cipher in pre- and post-quantum cryptography, this work shows that the optimality of information theoretic s...
In order to propagate transactions and blocks, today’s blockchain systems rely on unstructured peer-to-peer overlay networks. In such networks, broadcast is known to be an inefficient operation in ter...
Anonymous communication, that is secure end-to-end and unlinkable, plays a critical role in protecting user privacy by preventing service providers from using message metadata to discover communicatio...
A new hash-based, server-supported digital signature scheme was proposed recently. We decompose the concept into forward-resistant tags and a generic cryptographic time-stamping service. Based on the ...
In this work, we present a runtime approach, called MeltdownDetector, for detecting, isolating, and preventing ongoing Meltdown attacks that operate by causing segmentation faults. Meltdown exploits a...
We devise an efficient and data-oblivious algorithm for solving a bounded integral linear system of arbitrary rank over the rational numbers via the Moore-Penrose pseudoinverse, using finite-field ari...
A reputation system assigns a user or item a reputation value which can be used to evaluate trustworthiness. Bl{\"o}mer, Juhnke and Kolb in 2015, and Kaafarani, Katsumata and Solomon in 2018, gave for...
Logical cryptanalysis, first introduced by Massacci in 2000, is a viable alternative to common algebraic cryptanalysis techniques over boolean fields. With XOR operations being at the core of many cry...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...