搜索结果: 1-15 共查到“Transformation”相关记录457条 . 查询时间(0.112 秒)
Food Systems Transformation in Kenya: Lessons from the Past and Policy Options for the Future
Food Systems Transformation Kenya Policy Options Lessons
2024/4/1
The International Food Policy Research Institute (IFPRI), a CGIAR Research Center established in 1975, provides research-based policy solutions to sustainably reduce poverty and end hunger and ma...
潘亚玲著: The Transformation of American Political Culture and the Impact on Foreign Strategy(图)
国际关系 美国政治 外交战略
2023/12/19
雷速公司共建数据
潘亚玲,现为云南大学国际关系研究院研究员,复旦大学美国研究中心兼职研究员,主要研究美国政治与社会、美国外交与安全政策、国际关系理论等。
中国地质大学科学技术发展院左博新,胡祥云*等,计算机学院,Geophysical Research Letters (2020),Downward Continuation and Transformation of Total‐Field Magnetic Anomalies Into Magnetic Gradient Tensors Between Arbitrary Surfaces Using Multilayer Equivalent Sources
资源勘探;等效源方法;磁测;数据;下延拓;磁梯度;张量;转换计算
2021/10/15
近日,地球物理著名期刊《Geophysical Research Letters》正式刊发了中国地质大学胡祥云教授团队研究成果 -“Downward continuation and transformation of total-field magnetic anomalies into magnetic gradient tensors between arbitrary surfaces u...
Improvements of Thermal and Thermochemical Properties of Rosin by Chemical Transformation for Its Use as Biofuel
Rosin Isomerization Reduction Esterification Properties estimation
2024/2/29
The use of raw materials from renewable sources has become an important topic for different industries. Pine oleoresin is one of the most important renewable sources. It is composed of a broad range o...
On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces
Multivariate Cryptography stable transformation groups and semigroups decomposition problem of nonlinear multivariate map into given generators
2019/6/3
Noncommutative cryptography is based on applications of algebraic structures like noncommutative groups, semigroups and non-commutative rings. Its inter-section with Multivariate cryptography contains...
CPA-to-CCA Transformation for KDM Security
public-key encryption key-dependent message security chosen ciphertext security
2019/6/3
We show that chosen plaintext attacks (CPA) security is equivalent to chosen ciphertext attacks (CCA) security for key-dependent message (KDM) security. Concretely, we show how to construct a public-k...
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model
Fiat-Shamir post-quantum digital signatures
2019/3/1
The famous Fiat-Shamir transformation turns any public-coin three-round interactive proof, i.e., any so-called sigma-protocol, into a non-interactive proof in the random-oracle model. We study this tr...
SUPERPIXEL BASED FACTOR ANALYSIS AND TARGET TRANSFORMATION METHOD FOR MARTIAN MINERALS DETECTION
Superpixel Factor Analysis Target Transformation Minerals detection Mars
2018/5/15
The Factor analysis and target transformation (FATT) is an effective method to test for the presence of particular mineral on Martian surface. It has been used both in thermal infrared (Thermal Emissi...
RESEARCH ON COORDINATE TRANSFORMATION METHOD OF GB-SAR IMAGE SUPPORTED BY 3D LASER SCANNING TECHNOLOGY
GB-SAR Interference measurement 3D laser scanning Coordinate Transformation
2018/5/15
In the image plane of GB-SAR, identification of deformation distribution is usually carried out by artificial interpretation. This method requires analysts to have adequate experience of radar imaging...
A PRELIMINARY INVESTIGATION ON COMPARISON AND TRANSFORMATION OF SENTINEL-2 MSI AND LANDSAT 8 OLI
Sentinel-2 Landsat Spectral response function (SRF) Cross-calibration Transformation Consistency Uncertainty
2018/5/17
A PRELIMINARY INVESTIGATION ON COMPARISON AND TRANSFORMATION OF SENTINEL-2 MSI AND LANDSAT 8 OLI Timely and accurate earth observation with short revisit interval is usually necessary, especially for ...
RESEARCH ON AIRCRAFT TARGET DETECTION ALGORITHM BASED ON IMPROVED RADIAL GRADIENT TRANSFORMATION
Aircraft Target Detection Radial Gradient Transformation Rotation-Invariant Feature Polar Form Look-up Table
2018/5/17
Aiming at the problem that the target may have different orientation in the unmanned aerial vehicle (UAV) image, the target detection algorithm based on the rotation invariant feature is studied,and t...
TARGET TRANSFORMATION CONSTRAINED SPARSE UNMIXING (TTCSU) ALGORITHM FOR RETRIEVING HYDROUS MINERALS ON MARS: APPLICATION TO SOUTHWEST MELAS CHASMA
Prior information Sparse unmixing Hydrous minerals Mars CRISM
2018/5/15
Quantitative analysis of hydrated minerals from hyperspectral remote sensing data is fundamental for understanding Martian geologic process. Because of the difficulties for selecting endmembers from h...
延安大学翻译理论与实践课件Chapter 5 Transformation between Parts of Speech in English-Chinese Translation
延安大学 翻译理论与实践课件 Chapter 5 Transformation between Parts of Speech in English-Chinese Translation
2018/3/15
延安大学翻译理论与实践课件Chapter 5 Transformation between Parts of Speech in English-Chinese Translation。
An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge
statistical zero-knowledge honest-verifier statistical zero-knowledge instance-dependent commitment schemes
2018/3/6
We present an unconditional transformation from any honest-verifier statistical zero-knowledge (HVSZK) protocol to standard SZK that preserves round complexity and efficiency of both the verifier and ...
第三届“数字转型与全球社会”国际学术研讨会(2018 3rd International Conference on Digital Transformation & Global Society (DTGS 2018))
第三届 数字转型 全球社会 国际学术研讨会
2018/1/15
DTGS is an emerging international academic forum for the interdisciplinary Internet Studies field. The mission of the conference is to provide a collaborative platform for researchers and experts to d...