>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到知识库 techniques相关记录851条 . 查询时间(0.055 秒)
Mangroves provide many ecosystem services including a considerable capacity to sequester and store large amounts of carbon, both in the sediment and in the above-ground biomass. Assessment of mangrove...
In flood-prone areas, the delineation of the spatial pattern of historical flood extents, damage assessment, and flood durations allow planners to anticipate potential threats from floods and to formu...
The mechanical properties of plantation Eucalyptus Nitens timber are currently assessed by applying visual stress grading (VSG) designed for the sawn timber from the mature plantation and do not repre...
Forest loss and degradation in the Brazilian Amazon due to mining activities has been intense for many years. To reverse this situation, a range of restoration programs for deforested and degraded are...
The utilization of nanocellulose has increasingly gained attentions from various research fields, especially the field of polymer nanocomposites owing to the growing environmental hazardous of petrole...
As a part of the renewable energy cycle, forest biomass resources are considered to be important renewable materials and energy sources in many countries. It is evident from international and local re...
In this paper we consider various methods and techniques to find the smallest circuit realizing a given linear transformation on nn input signals and mm output signals, with a constraint of a maximum ...
We present a new efficient protocol for computing private set union (PSU). Here two semi-honest parties, each holding a dataset of known size (or of a known upper bound), wish to compute the union of ...
A key component of many lattice-based protocols is a zero-knowledge proof of knowledge of a vector s⃗ s→ with small coefficients satisfying As⃗ =u⃗ modqAs→=u→modq. While there exist ...
We devise new techniques for design and analysis of efficient lattice-based zero-knowledge proofs (ZKP). First, we introduce one-shot proof techniques for non-linear polynomial relations of degree k≥2...
In recent years, a number of attacks have been developed that can reconstruct encrypted one-dimensional databases that support range queries under the persistent passive adversary model. These attacks...
Invasive or semi-invasive attacks require, of course, because of their nature, the removal of metal layers or at least the package de-capsulation of the chip. For many people - not expert in those sam...
This work aims at presenting the use of new technologies in the field of forensic engineering. In particular, the use of UAV photogrammetry and laser scanning is compared with the traditional methods ...
The three-dimensional (3D) documentation and surveying of cultural heritage can be carried out following several geomatics techniques such as laser scanning and thermography in order to detect the ori...
Dodis and Yu (TCC 2013) studied how the security of cryptographic primitives that are secure in the "ideal" model in which the distribution of a randomness is the uniform distribution, is degraded whe...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...