搜索结果: 1-15 共查到“知识库 mechanisms”相关记录451条 . 查询时间(0.133 秒)
Epoxy based hybrid nanocomposites: Fracture mechanisms, tensile properties and electrical properties
Epoxy Nanocomposite Fracture mechanics Nanoparticles Electrical properties
2023/12/11
This work explore the effect of addition of a combination of rigid nanofillers and core–shell rubber nanoparticles on the?fracture mechanics, tensile, electrical and thermo-mechanical properties of ep...
Systems Pharmacology Dissection of Multi-Scale Mechanisms of Action of Huo-Xiang-Zheng-Qi Formula for the Treatment of Gastrointestinal Diseases
TCM gastrointestinal diseases functional dyspepsia systems pharmacology Huo-xiang-zheng-qi compatibility theory
2023/6/21
Multi-components Traditional Chinese Medicine (TCM) treats various complex diseases (multi-etiologies and multi-symptoms) via herbs interactions to exert curative efficacy with less adverse effects. H...
Systems Pharmacology Dissection of Multiscale Mechanisms of Action for Herbal Medicines in Treating Rheumatoid Arthritis
Rheumatoid arthritis TCM Systems-Pharmacology MD MM-PBSA
2023/6/19
As a chronic inflammatory and angiogenic disease with increased morbidity and mortality, rheumatoid arthritis (RA) is characterized by the proliferation of synovial tissue and the accumulation of exce...
Metabolites and Transcriptional Profiling Analysis Reveal the Molecular Mechanisms of the Anthocyanin Metabolism in the “Zijuan” Tea Plant (Camellia sinensis var. assamica)
Camellia sinensis L. transcriptome anthocyanin biosynthesis metabolism degradation
2023/4/20
Anthocyanins are natural colorants that have attracted increasing attention because of their extensive range of antioxidant, antimutagenic, and health-promoting properties. The mechanism of anthocyani...
Optimized nitrogen management enhances lodging resistance of rice and its morpho-anatomical, mechanical, and molecular mechanisms
氮素管理 水稻 抗倒伏性 OPT
2023/4/21
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)
LWE RLWE KEM
2019/3/13
In this paper, we present a simple attack on LWE and Ring LWE encryption schemes used directly as Key Encapsulation Mechanisms (KEMs). This attack could work due to the fact that a key mismatch in a K...
Minting Mechanisms for Blockchain -- or -- Moving from Cryptoassets to Cryptocurrencies
Blockchain Cryptocurrencies Auction
2018/11/20
Permissionless blockchain systems, such as Bitcoin, rely on users using their computational power to solve a puzzle in order to achieve a consensus. To incentivise users in maintaining the system, new...
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
hybrid key exchange key exchange hybrids
2018/11/9
Concerns about the impact of quantum computers on currently deployed public key cryptography have instigated research into not only quantum-resistant cryptographic primitives but also how to transitio...
Perceived Stress, Stressors, and Coping Mechanisms Among PGY1 Pharmacy Residents
Perceived Stress Stressors Coping Mechanisms
2018/11/22
Objective. To evaluate perceived stress among postgraduate year 1 (PGY1) pharmacy residents and to examine relationships between perceived stress and certain demographic variables. Main stressors duri...
Cognitive mechanisms for inferring the meaning of novel signals during symbolisation
Graphics signal reasoning mechanism the language evolution
2018/3/5
As participants repeatedly interact using graphical signals (as in a game of Pictionary), the signals gradually shift from being iconic (or motivated) to being symbolic (or arbitrary). The aim here is...
Binding language: Structuring sentences through precisely timed oscillatory mechanisms
alpha and beta oscillations EEG language syntactic binding
2018/3/5
Syntactic binding refers to combining words into larger structures. Using EEG, we investigated the neural processes involved in syntactic binding. Participants were auditorily presented two-word sente...
Asian Hydroclimate Changes and Mechanisms in the Preboreal from an Annually-laminated Stalagmite, Daoguan Cave, Southern China
Daoguan Cave the Preboreal Bond Event ASM global changes
2018/4/10
One-year-resolved and annually-counted stalagmite multi-proxies (δ18O, δ13C, and layer width) from Daoguan Cave, Guizhou Province revealed detailed variability regarding the Asian Summer Monsoon (ASM)...
Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus
implementation Trusted Computing
2018/1/2
Trusted computing technologies may play a key role for cloud security as they enable users to relax the trustworthiness assumptions about the provider that operates the physical cloud infrastructure. ...
Towards an in-depth understanding of privacy parameters for randomized sanitization mechanisms
Anonymity Differential Privacy
2017/9/18
Differential privacy, and close other notions such as dχdχ-privacy, is at the heart of the privacy framework when considering the use of randomization to ensure data privacy. Such a guarantee is alway...