>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 f-function相关记录1533条 . 查询时间(0.199 秒)
This paper is motivated by our collaborative research and the aim is to model clinical assessments of upper limb function after stroke using 3D-position and 4D-orientation movement data. We present a ...
Soil organic carbon (SOC) plays a crucial role in global carbon cycling. The amount of SOC is influenced by many factors (climate, topography, forest type, forest disturbance, etc.). To investigate th...
Among all types of tea, black tea is produced in the largest amount worldwide, and its consumption is still increasing. Enzymatic fermentation is considered majorly contribute to quality formation of ...
ATBS1 INTERACTING FACTORs (AIFs)基因是一类bHLH蛋白,在植物生长发育过程中起着重要作用。本研究在亚洲棉、雷蒙德氏棉、陆地棉和海岛棉中分别鉴定得到8, 11, 16和15 AIFs。在该家族基因启动子中发现了多个与生长发育、胁迫和激素相关的启动元件。转录组数据显示该家族基因在棉花的花器官和纤维中高量表达。荧光定量表明该家族基因在纤维起始阶段高量表达。激素处理显示该家...
Terpenoids are physiologically active substances that are of great importance to humans. Their physicochemical properties are modified by glycosylation, in terms of polarity, volatility, solubility an...
2021年2月10日,公共卫生学院营养与食品卫生学教研室韩浩副教授团队在1区(Top)SCI期刊《Food & Function》上发表了最新研究成果“Plant sterol ester of α-linolenic acid ameliorates high-fat diet-induced nonalcoholic fatty liver disease in mice: associati...
This article reports on the investigation of possessive constructions as they are used in a corpus of spontaneous speech collected in 2015-2017 from speakers of Raga, the Oceanic vernacular of north P...
The task of function inversion is central to cryptanalysis: breaking block ciphers, forging signatures, and cracking password hashes are all special cases of the function-inversion problem. In 1980, H...
The Tire Pressure Monitoring System (TPMS) is used to monitor the pressure of the tires and to inform the driver of it. This equipment is mandatory for vehicles in US and EU. To ensure the security of...
Conjunctions. If the predicate computes a conjunction, our construction is a public-key function-private hidden vector encryption scheme. This addresses an open problem posed by Boneh, Raghunathan, an...
Two varieties of barley samples were subjected to germination conditions to investigate the underlying mechanisms underpinning changes in molecular structure, chemical compositions and thermal propert...
Secure multiparty computation (MPC) has been repeatedly optimized, and protocols with two communication rounds and strong security guarantees have been achieved. While progress has been made construct...
An adversary with SS bits of memory obtains a stream of QQ elements that are uniformly drawn from the set {1,2,…,N}{1,2,…,N}, either with or without replacement. This corresponds to sampling QQ elemen...
Boolean functions used in some cryptosystems of stream ciphers should satisfy various criteria simultaneously to resist some known attacks. The fast algebraic attack (FAA) is feasible if one can find ...
Let σσ be some positive integer and C⊆{(i,j):1≤iind finding a lower bound on the number of distinct blocks P1,…,Pσ∈{0,1}nP1,…,Pσ∈{0,1}n satisfying a s...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...