搜索结果: 1-15 共查到“Derivation”相关记录116条 . 查询时间(0.047 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars: Derivation of the Vlasov equation from quantum many-body Fermionic systems with singular interaction
奇异相互作用 量子多体 费米子系统 弗拉索夫方程
2023/5/12
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Derivation of the Vlasov equation from quantum many-body Fermionic systems with singular interaction
奇异相互作用 量子多体 费米子系统 弗拉索夫方程
2023/4/13
Identification of candidate genes for key fibre-related QTLs and derivation of favourable alleles in Gossypium hirsutum recombinant inbred lines with G. barbadense introgressions
海岛棉 基因组组分 遗传作图群体
2024/5/17
该研究以渗入了海岛棉基因组组分的优质种质鲁原343为亲本,构建了包含239个重组自交系的遗传作图群体,利用SLAF标签构建了高密度遗传图谱,结合7个环境的表型数据,共鉴定104个纤维品质和产量性状QTLs,其中66个QTL共定位于19个QTL簇中。该研究团队通过进一步对鲁原343进行全基因组深度测序,解析鲁原343的遗传组成及其对纤维相关性状的遗传贡献,发现来自G. hirsutum races(...
THRESHOLD DETERMINATION FOR LOCAL INSTANTANEOUS SEA SURFACE HEIGHT DERIVATION WITH ICEBRIDGE DATA IN BEAUFORT SEA
IceBridge optimal threshold Sea surface reference Beaufort sea
2018/5/17
The NASA Operation IceBridge (OIB) mission is the largest program in the Earth’s polar remote sensing science observation project currently, initiated in 2009, which collects airborne remote sensing m...
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
Multi-user security AES-GCM-SIV authenticated encryption
2018/2/8
This paper revisits the multi-user (mu) security of symmetric encryption, from the perspective of delivering an analysis of the AES-GCM-SIV AEAD scheme. Our end result shows that its mu security is co...
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation
modes of operation key derivation nonce-misuse resistance
2017/7/24
Block cipher modes of operation provide a way to securely encrypt using a block cipher. The main factors in analyzing modes of operation are the level of security achieved (chosen-plaintext security, ...
Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation
blockcipher ideal cipher indifferentiability
2016/12/9
We revisit the Even-Mansour (EM) scheme with random oracle key derivation previously considered by Andreeva et al. (CRYPTO 2013). For this scheme, Andreeva et al. provided an indifferentiability (from...
NON-TRIVIAL FEATURE DERIVATION FOR INTENSIFYING FEATURE DETECTION USING LIDAR DATASETS THROUGH ALLOMETRIC AGGREGATION DATA ANALYSIS APPLYING DIFFUSED HIERARCHICAL CLUSTERING FOR DISCRIMINATING AGRICULTURAL LAND COVER IN PORTIONS OF NORTHERN MINDANAO,PHILIPPINES
Image classification OBIA LiDAR Allometric relations Non-trivial feature derivations Euclidean transformation
2016/12/1
Leaning on the derived results conducted by Central Mindanao University Phil-LiDAR 2.B.11 Image Processing Component, the paper attempts to provides the application of the Light Detection and Ranging ...
DERIVATION OF FOREST INVENTORY PARAMETERS FOR CARBON ESTIMATION USING TERRESTRIAL LIDAR
Terrestrial LiDAR Point Cloud Data Tropical Rain Forest Inventory Parameters Above Ground Carbon Estimation
2016/11/30
This research was conducted to derive forest sample plot inventory parameters from terrestrial LiDAR (T-LiDAR) for estimating above ground biomass (AGB)/carbon stocks in primary tropical rain forest. ...
A SEGMENT-BASED APPROACH FOR DTM DERIVATION OF AIRBORNE LIDAR DATA
LIDAR DTM Segment-based Topological
2016/7/4
With the characteristics of LIDAR system, raw point clouds represent both terrain and non-terrain surface. In order to generate DTM, the paper introduces one improved filtering method based on the seg...
A DECIDIOUS-CONIFEROUS SINGLE TREE CLASSIFICATION AND INTERNAL STRUCTURE DERIVATION USING AIRBORNE LIDAR DATA
LiDAR species classification geometrical analysis bole derivation branch derivation
2016/2/29
This project has two main purposes; the first is to perform deciduous-coniferous classification for 65 trees by using the leaf-on single
flight LiDAR data. It was done by looking at the geometrical ...
Key Derivation for Squared-Friendly Applications: Lower Bounds
key derivation suqare-friendly applications
2016/2/23
Security of a cryptographic application is typically defined by a security game. The adversary, within certain resources, cannot win with probability much better than 0 (for unpredictability applicati...
Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs
Password-based key derivation memory usage cryptographic sponges
2016/1/26
We present Lyra, a password-based key derivation scheme
based on cryptographic sponges. Lyra was designed to be strictly sequential
(i.e., not easily parallelizable), providing strong security even ...
The M3lcrypt Password Based Key Derivation Function
applications Password Based Key Derivation Function
2016/1/23
M3lcrypt (canonical M3lcryptH) is a password based key derivation function built around the Merkle-Damgard hash function H. It supports large [pseudo]random salt values ( 128-bit) and password length...
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
block cipher ideal cipher indifferentiability
2016/1/6
Feistel constructions have been shown to be indifferentiable from random permutations at STOC 2011. Whereas how to properly mix the keys into an un-keyed Feistel construction without appealing to doma...