>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Derivation相关记录116条 . 查询时间(0.047 秒)
We consider the combined mean-field and semiclassical limit for a system of the N fermions interacting through singular potentials. We prove the uniformly in the Planck constant h propagation of quant...
We consider the combined mean-field and semiclassical limit for a system of the N fermions interacting through singular potentials. We prove the uniformly in the Planck constant h propagation of quant...
该研究以渗入了海岛棉基因组组分的优质种质鲁原343为亲本,构建了包含239个重组自交系的遗传作图群体,利用SLAF标签构建了高密度遗传图谱,结合7个环境的表型数据,共鉴定104个纤维品质和产量性状QTLs,其中66个QTL共定位于19个QTL簇中。该研究团队通过进一步对鲁原343进行全基因组深度测序,解析鲁原343的遗传组成及其对纤维相关性状的遗传贡献,发现来自G. hirsutum races(...
The NASA Operation IceBridge (OIB) mission is the largest program in the Earth’s polar remote sensing science observation project currently, initiated in 2009, which collects airborne remote sensing m...
This paper revisits the multi-user (mu) security of symmetric encryption, from the perspective of delivering an analysis of the AES-GCM-SIV AEAD scheme. Our end result shows that its mu security is co...
Block cipher modes of operation provide a way to securely encrypt using a block cipher. The main factors in analyzing modes of operation are the level of security achieved (chosen-plaintext security, ...
We revisit the Even-Mansour (EM) scheme with random oracle key derivation previously considered by Andreeva et al. (CRYPTO 2013). For this scheme, Andreeva et al. provided an indifferentiability (from...
This research was conducted to derive forest sample plot inventory parameters from terrestrial LiDAR (T-LiDAR) for estimating above ground biomass (AGB)/carbon stocks in primary tropical rain forest. ...
With the characteristics of LIDAR system, raw point clouds represent both terrain and non-terrain surface. In order to generate DTM, the paper introduces one improved filtering method based on the seg...
This project has two main purposes; the first is to perform deciduous-coniferous classification for 65 trees by using the leaf-on single flight LiDAR data. It was done by looking at the geometrical ...
Security of a cryptographic application is typically defined by a security game. The adversary, within certain resources, cannot win with probability much better than 0 (for unpredictability applicati...
We present Lyra, a password-based key derivation scheme based on cryptographic sponges. Lyra was designed to be strictly sequential (i.e., not easily parallelizable), providing strong security even ...
M3lcrypt (canonical M3lcryptH) is a password based key derivation function built around the Merkle-Damgard hash function H. It supports large [pseudo]random salt values ( 128-bit) and password length...
Feistel constructions have been shown to be indifferentiable from random permutations at STOC 2011. Whereas how to properly mix the keys into an un-keyed Feistel construction without appealing to doma...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...