搜索结果: 1-15 共查到“知识库 techniques”相关记录851条 . 查询时间(0.055 秒)
Estimating Mangrove Tree Biomass and Carbon Content: A Comparison of Forest Inventory Techniques and Drone Imagery
blue carbon allometry unmanned aerial vehicle photogrammetry coastal wetlands
2024/1/22
Mangroves provide many ecosystem services including a considerable capacity to sequester and store large amounts of carbon, both in the sediment and in the above-ground biomass. Assessment of mangrove...
Operational Monitoring and Damage Assessment of Riverine Flood-2014 in the Lower Chenab Plain, Punjab, Pakistan, Using Remote Sensing and GIS Techniques
floods Landsat-8 remote sensing GIS disaster mapping damage assessment Lower Chenab Plain
2024/1/19
In flood-prone areas, the delineation of the spatial pattern of historical flood extents, damage assessment, and flood durations allow planners to anticipate potential threats from floods and to formu...
Assessment of Different Measurement Methods/Techniques in Predicting Modulus of Elasticity of Plantation Eucalyptus nitens Timber for Structural Purposes
Eucalyptus nitens structural applications hardwood plantation structural grading modulus of elasticity
2023/12/6
The mechanical properties of plantation Eucalyptus Nitens timber are currently assessed by applying visual stress grading (VSG) designed for the sawn timber from the mature plantation and do not repre...
Tree Communities in Three-Year-Old Post-Mining Sites Under Different Forest Restoration Techniques in the Brazilian Amazon
dispersal importance value index pollination seed sources
2024/2/4
Forest loss and degradation in the Brazilian Amazon due to mining activities has been intense for many years. To reverse this situation, a range of restoration programs for deforested and degraded are...
A review on processing techniques of bast fibers nanocellulose and its polylactic acid (PLA) nanocomposites
Bast fibers Nanocellulose Biopolymer Polylactic acid Processing technique Nanocomposites
2024/2/28
The utilization of nanocellulose has increasingly gained attentions from various research fields, especially the field of polymer nanocomposites owing to the growing environmental hazardous of petrole...
Assessment Techniques in Forest Biomass along the Timber Supply Chain
forest biomass biomass energy supply chain biomass estimation assessment techniques biomass feedstock
2024/2/27
As a part of the renewable energy cycle, forest biomass resources are considered to be important renewable materials and energy sources in many countries. It is evident from international and local re...
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes
AES SBox circuit area circuit depth
2019/7/15
In this paper we consider various methods and techniques to find the smallest circuit realizing a given linear transformation on nn input signals and mm output signals, with a constraint of a maximum ...
Scalable Private Set Union from Symmetric-Key Techniques
Private Set Union Private Membership Test
2019/7/4
We present a new efficient protocol for computing private set union (PSU). Here two semi-honest parties, each holding a dataset of known size (or of a known upper bound), wish to compute the union of ...
Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs
Lattices Zero-Knowledge Proofs Commitments
2019/6/4
A key component of many lattice-based protocols is a zero-knowledge proof of knowledge of a vector s⃗ s→ with small coefficients satisfying As⃗ =u⃗ modqAs→=u→modq. While there exist ...
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications
lattice-based cryptography zero-knowledge proof CRT packing, ring signature
2019/5/9
We devise new techniques for design and analysis of efficient lattice-based zero-knowledge proofs (ZKP). First, we introduce one-shot proof techniques for non-linear polynomial relations of degree k≥2...
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
2019/4/22
In recent years, a number of attacks have been developed that can reconstruct encrypted one-dimensional databases that support range queries under the persistent passive adversary model. These attacks...
Cost effective techniques for chip delayering and in-situ depackaging
package removal delayering decapsulation
2019/3/20
Invasive or semi-invasive attacks require, of course, because of their nature, the removal of metal layers or at least the package de-capsulation of the chip. For many people - not expert in those sam...
FORENSIC ENGINEERING SURVEYS WITH UAV PHOTOGRAMMETRY AND LASER SCANNING TECHNIQUES
UAV Photogrammetry Terrestrial Laser Scanning
2019/3/1
This work aims at presenting the use of new technologies in the field of forensic engineering. In particular, the use of UAV photogrammetry and laser scanning is compared with the traditional methods ...
INTEGRATION OF SURVEYING TECHNIQUES TO DETECT THE IDEAL SHAPE OF A DOME: THE CASE OF THE ESCUELAS PíAS CHURCH IN VALENCIA
Laser scanner Cultural heritage Thermal camera 3D modelling
2019/2/28
The three-dimensional (3D) documentation and surveying of cultural heritage can be carried out following several geomatics techniques such as laser scanning and thermography in order to detect the ori...
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions
security evaluation Renyi divergence square-friendly
2019/1/26
Dodis and Yu (TCC 2013) studied how the security of cryptographic primitives that are secure in the "ideal" model in which the distribution of a randomness is the uniform distribution, is degraded whe...