>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到mitigating相关记录31条 . 查询时间(0.708 秒)
Arbuscular mycorrhizal (AM) fungi can increase the tolerance of host plants to drought, whereas the intrinsic mechanisms are not still fully elucidated. Flavonoids are a kind of antioxidants to scaven...
Email breaches are commonplace, and they expose a wealth of personal, business, and political data that may have devastating consequences. The current email system allows any attacker who gains access...
We present a key-policy attribute-based encryption scheme that is adaptively secure under a static assumption and is not directly affected by an attribute "one-use restriction." Our construction impro...
In the era of multi-drug resistant strains of tuberculosis (TB), it is important to identify other ways to mitigate and prevent disease. According to the World Health Organization (WHO), an estimated ...
Logic locking is a technique that's proposed to protect outsourced IC designs from piracy and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality only when a correct...
Logic locking is a technique that has been proposed to protect outsourced IC designs from piracy and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality only when ...
China’s sweeping program to restore forests across the country is working. The vast destruction of China’s forests, leveled after decades of logging, floods and conversion to farmland, has become...
This work introduces XMSS-T, a new hash-based signature scheme with tight security. Previous hash-based signature schemes are facing a loss of security, linear in performance parameters like the tot...
This publication is the result of extensive debates, discussions, and presentations by the FIG Task Force on Surveyors and Climate Change over the past three years. The Task Force was established at F...
Password-Authenticated Key Exchange allows users to generate a strong cryptographic key based on a shared 揾uman-memorable?password without requiring a public-key infrastructure. It is one of the most...
The Upper Tana River Basin is one of Kenya’s most important natural resource bases. Its Masinga Reservoir supplies water and hydroelectric power for 65 percent of the nation. Unregulated deforestation...
Using quantitative and qualitative data drawn from a population cohort of 20,000 people in South-West Uganda we explored factors (household size/dependency ratios/ residence patterns/ socio-economic s...
Post-tsunami field investigations are an essential component for improving our understanding of tsunamis and in developing the tools and programs necessary to mitigate their effects. A destructive tsu...
A complication of finite-volume triangular C-grid methods is the numerical emergence of horizontal divergence errors that lead to grid-scale oscillations in vertical velocity. Nonlinear feedback via a...
With its large-amplitude and short-duration pulses,atmospheric noise, produced by electrical discharges within clouds, dominates the low-frequency spectrum. Unless mitigated, this noise, which enters ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...