>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到operation相关记录262条 . 查询时间(0.062 秒)
Finnish utility Teollisuuden Voima Oyj (TVO) has issued an acceptance certificate to the Areva-Siemens consortium for the Olkiluoto 3 (OL3) EPR, which began regular electricity production on 16 April....
Unit 3 of the Fangchenggang nuclear power plant in China's Guangxi Autonomous Region has entered commercial operation, China General Nuclear (CGN) announced. The unit is the first of two CGN-designed ...
本次讲座主要针对智能运维中的建模优化问题。首先基于前期研究,我将讨论基于马尔可夫决策过程的有限周期的视情维护策略。考虑二元件系统以及系统元件的退化过程具有随机相关性,用二元伽马过程来描述系统退化过程。系统元件服从周期性检测,当元件的退化程度超过预防性维护阈值时,其会被替换。该维护问题可以表示成马尔可夫决策过程并可用动态规划来求解。不同于无限周期的维护策略,有限周期的最优策略是动态的,其在每次检测都...
We propose SPAE, a single pass, patent free, authenticated encryption with associated data (AEAD) for AES. The algorithm has been developped to address the needs of a growing trend in IoT systems: sto...
Lightweight cryptography in computationally constrained devices is actively studied. In contrast to advances of lightweight blockcipher in the last decade, lightweight mode of operation is seemingly n...
Using a small block length is a common strategy in designing lightweight block cipher. So far, many 64-bit primitives have been proposed. However, if we use such a 64-bit primitive for an authenticate...
华南理工大学流体力学与传热课件chapter1 Unit Operation Of Chemical Engineering。
After the incidence of a disaster, a high demand for first-aid and a huge number of injured will emerge at the affected areas. In this paper, the optimum allocation of the medical assistance to the in...
After the incidence of a disaster, a high demand for first-aid and a huge number of injured will emerge at the affected areas. In this paper, the optimum allocation of the medical assistance to the in...
Block cipher modes of operation provide a way to securely encrypt using a block cipher. The main factors in analyzing modes of operation are the level of security achieved (chosen-plaintext security, ...
We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multi-party computation engine. These two modes are selected because...
BLAKE2 is a hash function introduced at ACNS 2013, which has been adopted in many constructions and applications. It is a successor to the SHA-3 finalist BLAKE, which received a significant amount of ...
In this paper, we present a kernel sparse subspace clustering with spatial max pooling operation (KSSC-SMP) algorithm for hyperspectral remote sensing imagery. Firstly, the feature points are mapped f...
The research was focused on operational measurements of tractor plough tools and their subsequent utilisation and simulation under laboratory conditions by a hydrostatic simulator. In this field, th...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...