搜索结果: 1-15 共查到“Vector”相关记录525条 . 查询时间(0.102 秒)
【PloS Pathogen】Aal-circRNA-407 regulates ovarian development of Aedes albopictus, a major arbovirus vector, via the miR-9a-5p/Foxl axis
登革病毒 白纹伊蚊 非编码RNA 热带医学研究所
font style='font-size:12px;'>
2023/6/7
白纹伊蚊 (Aedes albopictus) 是登革病毒主要的传播媒介,其种群在全球范围内急剧扩张,被列为是“世界上100种最严重的外来入侵物种”之一,同时已被证实可传播至少26种病毒,对全球健康构成严重威胁。
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:2-representations and 2-vector bundles
2 向量丛 群论
font style='font-size:12px;'>
2023/4/13
中国地质大学科学技术发展院陈伟涛 等,计算机学院. Remote Sensing(2019), Fine Land Cover Classification in an Open Pit Mining Area Using Optimized Support Vector Machine and WorldView-3 Imagery
地质环境;遥感;智能;解译;研究领域
font style='font-size:12px;'>
2021/10/15
近日,中国地质大学计算机学院陈伟涛副教授团队再次在地质环境遥感智能解译研究领域取得重要进展。相关研究成果发表在国际著名期刊《Remote Sensing》(2018年影响因子为4.118)。论文第一作者为陈伟涛副教授,通讯作者为李显巨副教授。
Comparison of partial least squares-discriminant analysis, support vector machines and deep neural networks for spectrometric classification of seed vigour in a broad range of tree species
least squares-discriminant analysis spectrometric classification seed tree species
font style='font-size:12px;'>
2023/6/5
Public-Key Function-Private Hidden Vector Encryption (and More)
function privacy obfuscation conjunctions
font style='font-size:12px;'>
2019/6/26
Conjunctions. If the predicate computes a conjunction, our construction is a public-key function-private hidden vector encryption scheme. This addresses an open problem posed by Boneh, Raghunathan, an...
Anomalies and Vector Space Search: Tools for S-Box Reverse-Engineering
Reverse-engineering Vector space search BCT
font style='font-size:12px;'>
2019/5/21
S-boxes are functions with an input so small that the simplest way to specify them is their lookup table (LUT). Unfortunately, some algorithm designers exploit this fact to avoid providing the algorit...
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data
public-key cryptography applications pseudo-random functions
font style='font-size:12px;'>
2019/5/5
Ensuring secure deduplication of encrypted data is a very active topic of research because deduplication is effective at reducing storage costs. Schemes supporting deduplication of encrypted data that...
Compressing Vector OLE
Secure computation correlation generators FSS
font style='font-size:12px;'>
2019/3/13
Oblivious linear-function evaluation (OLE) is a secure two-party protocol allowing a receiver to learn a secret linear combination of a pair of field elements held by a sender. OLE serves as a common ...
On the Inner Product Predicate and a Generalization of Matching Vector Families
Predicate Encryption Inner Product Encoding Matching Vector Families
font style='font-size:12px;'>
2018/11/7
Our main result is a simple lower bound that allows us to show that known encodings for many predicates considered in the cryptographic literature such as greater than and threshold are essentially op...
IMAGE CLASSIFICATION FOR MAPPING OIL PALM DISTRIBUTION VIA SUPPORT VECTOR MACHINE USING SCIKIT-LEARN MODULE
Landsat oil palm Python remote sensing Scikit-learn support vector machine
font style='font-size:12px;'>
2018/11/9
The world has been alarmed with the global warming effects. Global warming has been a distress towards the environment, thus shorten the Earth’s lifespan. It is a challenging task to reduce the global...
MULTISPECTRAL AND PANCHROMATIC REGISTRATION OF ALSAT-2 IMAGES USING DENSE VECTOR MATCHING FOR PAN-SHARPENING PROCESS
Pan-sharpening band to band registration image-based registration Dense Vector Matching Alsat-2
font style='font-size:12px;'>
2018/6/4
The pan-sharpening is a widely used operation in remote sensing image processing, this operation aims at combining an observable high spatial resolution panchromatic image with a multispectral one, to...
A METHOD FOR THE SEAMLINES NETWORK AUTOMATIC SELECTION BASED ON BUILDING VECTOR
Building Vector Orthoimage Mosaicking Seamlines Network Automatic Selection
font style='font-size:12px;'>
2018/5/14
In order to improve the efficiency of large scale orthophoto production of city, this paper presents a method for automatic selection of seamlines network in large scale orthophoto based on the buildi...
WATERBODIES EXTRACTION FROM LANDSAT8-OLI IMAGERY USING AWATER INDEXS-GUIED STOCHASTIC FULLY-CONNECTED CONDITIONAL RANDOM FIELD MODEL AND THE SUPPORT VECTOR MACHINE
Water index CRF Landsa Water extraction SVM
font style='font-size:12px;'>
2018/5/15
One of the most important applications of remote sensing classification is water extraction. The water index (WI) based on Landsat images is one of the most common ways to distinguish water bodies fro...
DATUM FEATURE EXTRACTION AND DEFORMATION ANALYSIS METHOD BASED ON NORMAL VECTOR OF POINT CLOUD
Deformation Analysis Point Cloud Normal Vecto Datum Feature Cubic B-spline Curve
font style='font-size:12px;'>
2018/5/15
In order to solve the problem lacking applicable analysis method in the application of three-dimensional laser scanning technology to the field of deformation monitoring, an efficient method extractin...
ROAD DAMAGE EXTRACTION FROM POST-EARTHQUAKE UAV IMAGES ASSISTED BY VECTOR DATA
Road damage extraction Damage assessment Earthquake UAV images Object-oriented classification Threshold detection
font style='font-size:12px;'>
2018/5/11
Extraction of road damage information after earthquake has been regarded as urgent mission. To collect information about stricken areas, Unmanned Aerial Vehicle can be used to obtain images rapidly. T...