>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 Designing相关记录165条 . 查询时间(0.076 秒)
We report an advanced web server named pssRNAit (plant specific small non-coding RNAi tool) that can be used to design a pool of small interfering RNAs (siRNAs) for highly effective, specific, and non...
Recently, in IEEE Transactions on Industrial Informatics, Fan et al. proposed a lightweight RFID protocol which has been suggested to be employed for protecting the Medical Privacy in an IoT system. H...
A new generation of stream ciphers, small-state stream ciphers (SSCs), was born in 2015 with the introduction of the Sprout cipher. The new generation is based on using key bits not only in the initia...
Australia’s cities face significant social, economic and environmental challenges, driven by population growth and rapid urbanisation. The pressure to increase housing availability will lead to greate...
The Southeast Asian Haze in 2014 and 2015 is the worst transboundary haze episodes recorded to date. The haze mainly originated from burning of biomass material in peatland area, caused major health p...
Objective. To prepare pharmacy and dental students to collaborate as members of an interprofessional team by participating in an interprofessional practice experience. Methods. An interprofessional p...
This paper explores the application of real-time spatial information from urban transport systems to understand the outbreak, severity and spread of seasonal flu epidemics from a spatial perspective. ...
This paper explores the application of real-time spatial information from urban transport systems to understand the outbreak, severity and spread of seasonal flu epidemics from a spatial perspective. ...
One of the Bitcoin's innovations is the Proof of Work puzzle (aka scratch-off puzzle) as a consensus protocol for anonymous networks without pre-established PKI. Bitcoins based on the Proof of Work pu...
After the introduction of some stream ciphers with the minimal internal state, the design idea of these ciphers (i.e. the design of stream ciphers by using a secret key, not only in the initialization...
The strong market competition forces forest owners to find innovative approaches to forest management, and business models are becoming integral parts of successful innovations and business strategie...
In a sense, a two-party protocol achieves fairness if the output from the computation is obtained simultaneously by both parties. A seminal result by Cleve (STOC 1986) states that fairness is impossib...
When it comes to side-channel countermeasures, software encoding schemes are becoming popular and provide a good level of security for generalpurpose microcontrollers. However, these schemes are not...
In this paper, we improve the lower bound on the maximum nonlinearity of 1- resilient Boolean functions, for n even, by proposing a method of constructing this class of functions attaining the best ...
Linear layer is a fundamental primitive for many aspects of information technology. For information security, the performance of a linear layer depends on two aspects: diffusion ability and implemen...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...