搜索结果: 1-15 共查到“知识库 approach”相关记录2864条 . 查询时间(0.343 秒)
A Bayesian Approach to Estimating Seemingly Unrelated Regression for Tree Biomass Model Systems
Bayesian approaches seemingly unrelated regression Korean larch Markov chain Monte Carlo Gibbs sampler
2024/1/19
Accurate estimation of tree biomass is required for accounting for and monitoring forest carbon stocking. Allometric biomass equations constructed by classical statistical methods are widely used to p...
Allometric Biomass Model for Aquilaria Malaccensis Lam. in Bangladesh: A Nondestructive Approach
Allometry Aquilaria malaccencis biomass biomass expansion factor
2023/12/18
Aquilaria malaccensis Lam. is an important commercial tree species of Bangladesh. This species is widely planted for the increased demand for an essential oil locally knows as "Agar". A nondestructive...
A systems genetics approach to deciphering the effect of dosage variation on leaf morphology in Populus
Populus leaf morphology plant genomes gene dosage morphological
2023/12/6
Gene copy number variation is frequent in plant genomes of various species, but the impact of such gene dosage variation on morphological traits is poorly understood. We used a large population of Pop...
Porous frozen material approach to freeze-drying of instant coffee
Freeze-drying desorption drying time initial saturation sublimation
2023/6/19
Porous frozen material with a certain initial porosity was prepared to explore its influence on freeze-drying experimentally. Soluble coffee was selected as the solute in aqueous solution and liquid n...
Characterizing volatile metabolites in raw Pu’er tea stored in wet-hot or dry-cold environments by performing metabolomic analysis and using the molecular sensory science approach
生普洱茶 代谢组学分析 干冷环境 湿热环境 气味标记
2023/4/20
The aroma profile of raw pu’er tea (RPT) depends on its storage duration (2–10 years) and storage conditions (wet-hot or dry-cold environment). We analyzed the major odorants of RPT samples by perform...
An approach to quantify natural durability of Eucalyptus bosistoana by near infrared spectroscopy for genetic selection
Eucalyptus near infrared spectroscopy genetic selection
2023/6/5
Modeling the Carbon Cycle of a Subtropical Chinese Fir Plantation Using a Multi-Source Data Fusion Approach
process-based terrestrial ecosystem model model–data fusion multi-source data carbon cycle plantation
2024/2/5
Process-based terrestrial ecosystem models are increasingly being used to predict carbon (C) cycling in forest ecosystems. Given the complexity of ecosystems, these models inevitably have certain defi...
Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — A Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography
Pre- and Post-Quantum Cryptography Scalable One-Time Pad (S-OTP) Information Conservational Security (ICS)
2019/8/14
Whereas it is widely deemed impossible to overcome the optimality of the one-time pad (OTP) cipher in pre- and post-quantum cryptography, this work shows that the optimality of information theoretic s...
Kadcast: A Structured Approach to Broadcast in Blockchain Networks
broadcast blockchain cryptocurrency peer-to-peer
2019/8/2
In order to propagate transactions and blocks, today’s blockchain systems rely on unstructured peer-to-peer overlay networks. In such networks, broadcast is known to be an inefficient operation in ter...
Simple and Efficient Approach for Achieving End-to-End Anonymous Communication
cryptographic protocols Anonymous communication
2019/7/15
Anonymous communication, that is secure end-to-end and unlinkable, plays a critical role in protecting user privacy by preventing service providers from using message metadata to discover communicatio...
A New Approach to Constructing Digital Signature Schemes (Extended Paper)
digital signatures hash functions public-key cryptography
2019/6/10
A new hash-based, server-supported digital signature scheme was proposed recently. We decompose the concept into forward-resistant tags and a generic cryptographic time-stamping service. Based on the ...
MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks
Meltdown side-channel attacks countermeasures
2019/6/4
In this work, we present a runtime approach, called MeltdownDetector, for detecting, isolating, and preventing ongoing Meltdown attacks that operate by causing segmentation faults. Meltdown exploits a...
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals
secure linear algebra multiparty computation Moore-Penrose pseudoinverse
2019/5/13
We devise an efficient and data-oblivious algorithm for solving a bounded integral linear system of arbitrary rank over the rational numbers via the Moore-Penrose pseudoinverse, using finite-field ari...
A New Approach to Modelling Centralised Reputation Systems
group signatures direct anonymous attestation reputation systems
2019/5/9
A reputation system assigns a user or item a reputation value which can be used to evaluate trustworthiness. Bl{\"o}mer, Juhnke and Kolb in 2015, and Kaafarani, Katsumata and Solomon in 2018, gave for...
A SAT-based approach for index calculus on binary elliptic curves
discrete logarithm index calculus elliptic curves
2019/3/22
Logical cryptanalysis, first introduced by Massacci in 2000, is a viable alternative to common algebraic cryptanalysis techniques over boolean fields. With XOR operations being at the core of many cry...