搜索结果: 1-15 共查到“知识库 State”相关记录1845条 . 查询时间(0.109 秒)
Using unmanned aerial vehicle for identifying the vegetative vigor and quantify the area occupied by eucalyptus sprouts after chemical weeding in the state of Bahia, Brazil
Geotechnology Health of plants Precision?forestry Supervised classification
2024/1/12
Currently, the efficiency of chemical weeding for controlling eucalyptus sprouts is measured by field sampling, but the inefficiency of the sampling methods has led to the investigation of new technol...
Influence of Eurotium cristatum and Aspergillus niger individual and collaborative inoculation on volatile profile in liquid-state fermentation of instant dark teas
Instant dark tea Eurotium cristatum Aspergillus niger Liquid-state fermentation Volatile components Sensory analysis
2023/4/20
The three instant dark teas were produced from instant green tea (IGT) by liquid-state fermentations using the microorganisms Eurotium cristatum (EFT), Aspergillus niger (AFT), and sequential inoculat...
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
Small-state stream cipher Grain Correlation attack
2019/7/15
Many cryptographers have focused on lightweight cryptography, and a huge number of lightweight block ciphers have been proposed. On the other hand, designing lightweight stream ciphers is a challengin...
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
Fast correlation attack Stream cipher Grain-like
2019/7/8
The fast correlation attack (FCA) is one of the most important cryptanalytic techniques against LFSR-based stream ciphers. In CRYPTO 2018, Todo et al. found a new property for the FCA and proposed a n...
On designing secure small-state stream ciphers against time-memory-data tradeoff attacks
Stream cipher Ultra-lightweight Small-state
2019/6/10
A new generation of stream ciphers, small-state stream ciphers (SSCs), was born in 2015 with the introduction of the Sprout cipher. The new generation is based on using key bits not only in the initia...
Smart contracts are self-executing agreements written in program code and are envisioned to be one of the main applications of blockchain technology. While they are supported by prominent cryptocurren...
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Encrypted Database Attack Range Query
2019/5/5
Recent foundational work on leakage-based attacks on encrypted databases has broadened our understanding of what an adversary can accomplish with a standard leakage profile. Nevertheless, all known va...
Game Channels: State Channels for the Gambling Industry with Built-In PRNG
blockchain distributed cryptography public-key cryptography
2019/4/10
Blockchain technology has immense potential. At the same time, it is not always possible to scale blockchains. State Channels solve the problem of scalability while increasing the blockchain's speed a...
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure
RFID scheme PUF authentication
2019/2/27
Privacy and mutual authentication under corruption with temporary state disclosure are two significant requirements for real-life applications of RFID schemes. No RFID scheme is known so far to meet t...
Cryptography with quantum states exhibits a number of surprising and counterintuitive features. In a 2002 work, Barnum et al. argued informally that these strange features should imply that digital si...
MONITORING OF AGRICULTURAL DROUGHT USING FORTNIGHTLY VARIATION OF VEGETATION CONDITION INDEX (VCI) FOR THE STATE OF TAMIL NADU, INDIA
Agricultural drought monitoring Vegetation condition index (VCI) Drought severity map Geographic Information Systems (GIS) Normalized differenced vegetation index (NDVI)
2018/11/9
India being an agrarian nation widely depends upon rainfall for its agricultural productivity. The failure of rainfall and hence shortfall of productivity badly affects national economy. With an intri...
ACHIEVING THE STATE OF RESEARCH PERTAINING TO GIS APPLICATIONS FOR CULTURAL HERITAGE BY A SYSTEMATIC LITERATURE REVIEW
Geographic Information Systems GIS, Cultural Heritage
2018/11/9
During the last decade, we have witnessed an increased interest in Geographic Information Systems (GIS), including the so-called “Historical GIS”, 3D GIS heritage and its subcategory of “SDI for cultu...
INVESTIGATING THE STATE OF PLAY OF GEOBIM ACROSS EUROPE
BIM GIS Interoperability GeoBIM Research Challenges interoperability data integration National Mapping and Cadastral Agency
2018/11/9
In both the Geographic Information (Geo) and Building Information Modelling (BIM) domains, it is widely acknowledged that the integration of data from both domains is beneficial and a crucial step in ...
A Progress Report on the State of Pharmacy Informatics Education in US Pharmacy Schools and Colleges
Progress Report the State Pharmacy
2018/11/22
Objective. To characterize informatics education opportunities in US colleges and schools of pharmacy curricula.
Methods. Informatics curricular information online was catalogued via publicly availab...
Continuously Non-Malleable Codes with Split-State Refresh
non-malleable codes tamper-resilient cryptography split-state model
2018/6/19
Non-malleable codes for the split-state model allow to encode a message into two parts, such that arbitrary independent tampering on each part, and subsequent decoding of the corresponding modified co...