搜索结果: 1-15 共查到“知识库 BACK”相关记录171条 . 查询时间(0.093 秒)
基于SCA波形采样读出电子学的CSNS Back-n中子飞行时间测量
中子飞行时间测量 SCA波形采样 读出电子学
font style='font-size:12px;'>
2021/1/8
中国散裂中子源(CSNS)反角白光中子束线(Back-n)对中子核数据测量和核技术应用等多个领域均有重要意义。为监测其中子束斑轮廓、束流密度及束流能量,研制了由镀硼微网格气体(Micromegas)探测器构成的束流剖面监测装置,并通过测量中子的飞行时间(TOF)来获得能量信息。
Teach-back方式在VSD患者围术期健康教育中的应用评价
Teach-back 负压封闭引流术 围术期 健康教育
font style='font-size:12px;'>
2020/12/15
探讨Teach-back方式在负压封闭引流术(VSD)患者围术期健康教育中的应用价值。方法选取行VSD治疗的创伤患者92例,其中48例采用Teach-back方式(观察组),另外44例采用传统健康教育(对照组)。比较两组患者对VSD健康教育内容的掌握率及护理满意度。
From Usability to Secure Computing and Back Again
secure multi-party computation (MPC) usability real-world deployment
font style='font-size:12px;'>
2019/6/24
Secure multi-party computation (MPC) allows multiple parties to jointly compute the output of a function while preserving the privacy of any individual party's inputs to that function. As MPC protocol...
From FE Combiners to Secure MPC and Back
MPC Communication efficiency FE combiners
font style='font-size:12px;'>
2018/5/22
Functional encryption (FE) has incredible applications towards computing on encrypted data. However, constructing the most general form of this primitive has remained elusive. Although some candidate ...
Fructose: back to the future?
nutrient metabolic endocrine responses diabetes downstream cardiometabolic complications
font style='font-size:12px;'>
2018/11/15
Sugars have emerged as the dominant nutrient of concern. Attention has focused squarely on the fructose moiety as the main bad actor in sugars due to its unique set of biochemical, metabolic, and endo...
Back to Massey: Impressively fast, scalable and tight security evaluation tools
side-channel attacks guessing entropy bounds
font style='font-size:12px;'>
2017/6/28
None of the existing rank estimation algorithms can scale to large cryptographic keys, such as 4096-bit (512 bytes) RSA keys. In this paper, we present the first solution to estimate the guessing entr...
From Indifferentiability to Constructive Cryptography (and Back)
indifferentiability of systems Constructive Cryptography
font style='font-size:12px;'>
2016/12/9
The concept of indifferentiability of systems, a generalized form of indistinguishability, was proposed in 2004 to provide a simplified and generalized explanation of impossibility results like the no...
COSTAL BATHYMETRY ESTIMATION FROM MULTISPECTRAL IMAGE WITH BACK PROPAGATION NEURAL NETWORK
Bathymetry Multispectral Image Stereo Image Back Propagation Neural Network
font style='font-size:12px;'>
2016/12/1
Bathymetric data in coastal area are important for marine sciences, hydrological applications and even for transportation and military purposes. Compare to traditional sonar and recent airborne bathym...
Polyphenol epidemiology: looking back and moving forward
Polyphenol epidemiology moving forward
font style='font-size:12px;'>
2018/12/13
Polyphenols are bioactive compounds that are ubiquitous in plant-based foods and beverages, such as fruit, vegetables, nuts, legumes, whole-grain cereals, cocoa, tea, coffee, and wine (1). Dietary pol...
Effects of Replacing Pork Back Fat with Canola and Flaxseed Oils on Physicochemical Properties of Emulsion Sausages from Spent Layer Meat
Spent Layer Meat Fat Replacer Canola Oil Flaxseed Oil Emulsion Stability Fatty Acid Profile
font style='font-size:12px;'>
2016/7/27
The objective of this study was to investigate the effects of canola and flaxseed oils on the physicochemical properties and sensory quality of emulsion-type sausage made from spent layer meat. Three ...
From Philosophy of Science to Philosophy of Literature (and Back) via Philosophy of Mind:Philip Kitcher’s Philosophical Pendulum
Philip Kitcher Philosophy of Literature Philosophy of Science Emotions filosofía de la literatura filosofía de la ciencia emociones
font style='font-size:12px;'>
2016/6/15
A recent focus of Philip Kitcher’s research has been, somewhat surprisingly in the light of his earlier work, the philosophical analyses of literary works and operas. Some may see a discontinuity in K...
Kummer strikes back: new DH speed records
performance Diffie–Hellman hyperelliptic curves
font style='font-size:12px;'>
2016/1/25
This paper sets new speed records for high-security constanttime
variable-base-point Diffie–Hellman software: 305395 Cortex-A8-slow
cycles; 273349 Cortex-A8-fast cycles; 88916 Sandy Bridge cycles; 8...
Dual EC: A Standardized Back Door
Random-number generation back doors NSA
font style='font-size:12px;'>
2015/12/24
Dual EC is an algorithm to compute pseudorandom numbers starting from some random input. Dual EC was standardized by NIST, ANSI, and ISO among other algorithms to generate pseudorandom numbers. For a ...
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back
information-theoretic security Private Simultaneous Messages Zero-Information Arthur-Merlin
font style='font-size:12px;'>
2015/12/21
G¨o¨os, Pitassi and Watson (ITCS, 2015) have recently introduced the notion of Zero-Information
Arthur-Merlin Protocols (ZAM). In this model, which can be viewed as a private version of the
standard...
Back To The Future:Directions For Research In Teaching And Teacher Education
teacher education research on teaching
font style='font-size:12px;'>
2015/11/9
In this article, the authors examine two distinct but closely related fields, research on teaching and research on teacher education. Despite its roots in research on teaching, research in teacher edu...