>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到context相关记录566条 . 查询时间(0.125 秒)
It has been widely reported that biodiversity, ecosystems, and functional traits are positively interrelated in natural?forest?ecosystems. However, it remains unclear whether these relationships shoul...
Key separation is often difficult to enforce in practice. While key reuse can be catastrophic for security, we know of a number of cryptographic schemes for which it is provably safe. But existing for...
山东师范大学心理学院青少年心理学课件chapter7 Developmental Context–Peer。
地面微地震监测采集到的微地震信号通常能量微弱,信噪比低,如何提高微震数据的信噪比是数据处理的难题.Shearlet变换是一种新型的多尺度几何分析方法,具有敏感的方向性和较强的稀疏表示特性,能起到很好的随机噪声压制效果.由于地面微震数据的有效信号大多被淹没在噪声中,基于传统阈值的Shearlet变换(the traditional threshold-based Shearlet transform...
Research material included data on gestation length of 15 436 cows of Polish native breeds. These were: White Backed (BG; 324 records), Polish Red (RP; 5396 records), Polish Black and White (ZB; 3508 ...
RS and GIS data have been acquired as a primary source for study. The satellite images mainly show the temporal changes in coastal morphology and shorelines of the area. The main aim is to analyze the...
From an IoT point of view, the continuous growth of cheap and versatile sensor technologies has generated a massive data flow in communication networks, which most of the time carries unnecessary or r...
This study has developed a framework for adoption of geospatial governance in the context of e-government in Tanzania. After examining the governance of geospatial data, identify factors affecting gov...
Demanding computations are increasingly outsourced to cloud platforms. For such outsourced computations, the efficient verifiability of results is a crucial requirement. When sensitive data is involve...
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread     mesh network  IEEE 802.15.4  AES-CCM       font style='font-size:12px;'> 2018/1/19
The distinguishing feature of the Internet of Things is that many devices get interconnected. The threat of side-channel attacks in this setting is less understood than the threat of traditional netwo...
This study assessed the effects of semantic context in the form of self-produced and other-produced words on subsequent language production. Pairs of participants performed a joint picture naming task...
Purpose This study investigated whether and to what extent iconic co-speech gestures contribute to information from visible speech to enhance degraded speech comprehension at different levels of noise...
In natural situations, speech perception often takes place during the concurrent execution of other cognitive tasks, such as listening while viewing a visual scene. The execution of a dual task typica...
Understanding how hash functions can be used in a sound manner within cryptographic protocols, as well as how they can be constructed in a sound manner from compression functions, are two important pr...
his essay describes an integrated approach – field survey, historic research, climate data, and topography – for the analysis of a complex stratigraphical archaeological site, highlighting its peculia...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...