搜索结果: 1-15 共查到“知识库 Real”相关记录925条 . 查询时间(0.109 秒)
《Real Estate Economics》Volume 50, Issue 4 Winter 2022
《Real Estate Economics》 Volume 50 Issue 4 Winter 2022
2024/12/9
《Real Estate Economics》Volume 50, Issue 4 Winter 2022.
《Real Estate Economics》Volume 50, Issue 6 November 2022
《Real Estate Economics》Volume 50 Issue 6 November 2022
2024/12/9
《Real Estate Economics》Volume 50, Issue 6 November 2022.
《Real Estate Economics》Volume 50, Issue 5 September 2022
《Real Estate Economics》 Volume 50 Issue 5 September 2022
2024/12/9
《Real Estate Economics》Volume 50, Issue 5 September 2022.
《Real Estate Economics》Volume 50, Issue 3 Autumn (Fall) 2022
《Real Estate Economics》 Volume 50 Issue 3 Autumn (Fall) 2022
2024/12/9
《Real Estate Economics》Volume 50, Issue 3 Autumn (Fall) 2022.
《Real Estate Economics》Volume 50, Issue 2 Summer 2022
《Real Estate Economics》 Volume 50 Issue 2 Summer 2022
2024/12/9
《Real Estate Economics》Volume 50, Issue 2 Summer 2022.
《Real Estate Economics》Volume 50, Issue 1 Spring 2022
《Real Estate Economics》 Volume 50 Issue 1 Spring 2022
2024/12/9
《Real Estate Economics》Volume 50, Issue 1 Spring 2022.
As the official journal of the American Real Estate and Urban Economics Association, Real Estate Economics is the premier journal on real estate topics.
Rapid and real-time detection of black tea fermentation quality by using an inexpensive data fusion system
红茶 发酵质量 NIRS CVS SVM
2023/4/20
Intelligent identification of black tea fermentation quality is becoming a bottleneck to industrial automation. This study presents at-line rapid detection of black tea fermentation quality at industr...
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Password Authentication VANET Group-Key generation
2019/9/19
Vehicular Ad-hoc Networks (VANETs) are a cardinal part of intelligent transportation system (ITS) which render various services in terms of traffic and transport management. The VANET is used to manag...
Towards real-time hidden speaker recognition by means of fully homomorphic encryption
Fully Homomorphic Encryption Neural Networks LWE
2019/8/30
Securing Neural Network (NN) computations through the use of Fully Homomorphic Encryption (FHE) is the subject of a growing interest in both communities. Among different possible approaches to that to...
Highly Efficient Key Exchange Protocols with Optimal Tightness -- Enabling real-world deployments with theoretically sound parameters
AKE provable security tightness
2019/6/24
In this paper we give nearly-tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols which are extremely simple and efficient. Unli...
THE REAL IN THE VIRTUAL. THE 3D MODEL IN THE CULTURAL HERITAGE SECTOR: THE TIP OF THE ICEBERG
BIM for Cultural Heritage (HBIM) Advanced 3D conservation
2019/3/4
The twenty-year and interdisciplinary research activity carried out by Virtualgeo has focused on the development of new methods and tools for 3D modeling that go beyond the simple digital-virtual reco...
TO ACHIEVE REAL IMMERSION: THE 3D VIRTUAL AND PHYSICAL RECONSTRUCTION OF CAVE 3 AND CAVE 12 OF YUNGANG GROTTOES
cascade SfM robust detailed MVS 3D printing replica cave
2019/3/1
s the 3D laser scanning and photogrammetry technologies continue to mature, more and more applications founded in numerous areas. The realistic 3D models are mainly adopted for digital display uses, s...
LANDSLIDE HAZARD ZONATION IN AND AROUND KEDARNATH REGION AND ITS VALIDATION BASED ON REAL TIME KEDARNATH DISASTER USING GEOSPATIAL TECHNIQUES
Landslide Hazard Zonation GIS Orthorectification Drainage Density Geomorphology
2019/2/28
Landslides are one of the frequently happening disasters in this hilly state of Uttarakhand which accounts to the loss of lives and property every year especially during the rainy season which lead to...
From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation
Cryptography Protocols Multi-Party Computation
2018/5/22
We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it...