搜索结果: 1-15 共查到“reduction”相关记录765条 . 查询时间(0.234 秒)
School Colloquium——Stable reduction of algebraic curves and abelian varieties
北大 algebraic curves abelian varieties
2023/6/16
The stable reduction theorem was proved by Grothendieck for Abelian varieties and subsequently by Deligne and Mumford for projective curves.
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Drivers and reduction solutions of food waste
食物浪费 驱动因素 减少解决方案
2023/4/19
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A unified method to construct soliton solutions to NLS type equations by the KP-Toda reduction approach: Part II discrete case
KP-户田约简法 NLS类型 方程孤子解 统一方法 离散情况
2023/4/27
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A unified method to construct soliton solutions to NLS type equations by the KP-Toda reduction approach: Part I continuous case
KP-户田约简法 NLS类型 方程孤子解 统一方法 离散情况
2023/4/27
Identification and Functional Analysis of Two Alcohol Dehydrogenase Genes Involved in Catalyzing the Reduction of (Z)‑3-Hexenal into (Z)‑3-Hexenol in Tea Plants (Camellia sinensis)
乙醇脱氢酶 ADH AsODNs Camellia sinensis
2023/4/19
Alcohol dehydrogenase (ADH) is a vital enzyme in the biosynthesis pathway of six-carbon volatiles in plants. However, little is known about its functions in tea plants. Here, we identified two ADH gen...
High cadmium pollution from sediments in a eutrophic lake caused by dissolved organic matter complexation and reduction of manganese oxide
eutrophication lake pollution dissolved organic matter DOM DGT
2021/7/27
Eutrophication and metal pollution are global environmental problems. The risk of metal pollution is high in the eutrophic lakes because of high mobility of metal in sediments.
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos
Kerberos authenticated key exchange
2019/7/10
Kerberos is one of the earliest network security protocols, providing authentication between clients and servers with the assistance of trusted servers. It remains widely used, notably as the default ...
The General Sieve Kernel and New Records in Lattice Reduction
cryptanalysis lattice reduction sieving
2019/1/29
We propose the General Sieve Kernel (G6K, pronounced /ʒe.si.ka/), an abstract stateful machine supporting a wide variety of lattice reduction strategies based on sieving algorithms. Using the bas...
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS
LWE problem lattice-based cryptography side-channel analysis
2018/11/19
Our interest in studying this problem stems from the side-channel attack against the BLISS lattice-based signature scheme described by Espitau et al. at CCS 2017. The attack targets a quadratic functi...
ON VOLUME DATA REDUCTION FOR LIDAR DATASETS
LiDAR Redundancy Q-tree Big Data Problem Topography DTM
2018/11/9
This paper discusses a current issue for several experimental science disciplines, which is the Big Data Problem (BDP). This research study focused on light intensity and ranging (LiDAR) datasets, whi...
2019年“一带一路”防灾减灾与可持续发展国际研讨会通知(1st-Announcement of International Conference on Silk-roads Disaster Risk Reduction and Sustainable Development May, 2019, Beijing, CHINA )
2019年 一带一路 防灾减灾 可持续发展 国际研讨会 通知
2018/7/31
The Silk Road Economic Belt and the 21st Century Maritime Silk Road (simply called “the Belt and Road” or “Silk roads”) covers more than 70 countries and 4.4 billion people (63% of the world). Due to ...
OPTIMAL INFORMATION EXTRACTION OF LASER SCANNING DATASET BY SCALE-ADAPTIVE REDUCTION
Multi-scale Surface variation Radial basis function Just-Noticeable-Difference Degradation
2018/5/16
3D laser technology is widely used to collocate the surface information of object. For various applications, we need to extract a good perceptual quality point cloud from the scanned points. To solve ...
State-Separating Proofs: A Reduction Methodology for Real-World Protocols
composition verification key exchange
2018/4/4
The security analysis of real-world protocols involves reduction steps that are conceptually simple but have to handle complicated protocol details. Taking inspiration from Universal Composability, Ab...
“DISASTER RESILIENT SOCIETY WITH YOUTH” PROJECT OF THE CIVIL DEFENCE ORGANIZATION AIMING DISASTER RISKS REDUCTION
Disaster Resilience Risks Reduction Voluntarism Youth
2018/4/18
The loss of lives, injuries and the damage on economies that occur as a result of disasters is increasing due to the changing nature. People need to adopt themselves to be able to resist against disas...
FLOOD VULNERABILITY REDUCTION, USING A PARTIAL PARTICIPATORY GIS APPROACH. A STUDY CASE IN BAJA CALIFORNIA SUR, MEXICO
Participatory cartography loods cyclones vulnerability reduction
2018/4/18
A partial participatory GIS approach was implemented in a community in La Paz, Baja California Sur, Mexico to reduce vulnerability of floods caused by cyclones. A workshop was held to locate areas sus...