>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到construct相关记录51条 . 查询时间(0.312 秒)
Enhancing the fire safety of epoxy resin (EP) concomitant with less mechanical performance degradation is still a challenge for traditional flame retardants. Hence, polypyrrole (PPy) was used as a fil...
In the second part, I will mainly focus on two semi-discrete models: Ablowitz-Ladik equation and fully discrete NLS equation. First, I will clarify the connection of these two discrete models with dis...
In these two talks, I will present a unified method to construct soliton solutions to NLS type equations by the KP-Toda reduction approach. I will take the NLS equation as a typical example and show h...
CSIDH is an isogeny-based key exchange protocol proposed by Castryck, Lange, Martindale, Panny, and Renes in 2018. CSIDH is based on the ideal class group action on FpFp-isomorphic classes of Montgome...
Trusted parties and devices are commonly used in the real world to securely perform computations on secret inputs. However, their security can often be compromised by side-channel attacks in which the...
Purpose The development of valid measures of built environments relevant for physical activity is an important step toward controlling the global epidemic of physical inactivity–related noncommunicabl...
Princeton researchers have for the first time revealed the mechanics of how bacteria build up slimy masses, called biofilms, cell by cell. When encased in biofilms in the human body, bacteria are a th...
Imagine that you are a cardiologist consulting a patient about his high levels of cholesterol. First,you present the ideal treatment: changes in diet and exercise. However, you also offer a backup pla...
In this paper, a new way to construct cryptographic hash function is given. The cryptographic hash function is generalized to uncertain function which has various specific function forms. When compu...
A searchable symmetric encryption (SSE) scheme allows a client to store a set of encrypted files on an untrusted server in such a way that he can efficiently retrieve some of the encrypted files con...
A Construct Validity Study of Bullying     Bullying  Validity       2015/9/15
The construct validity of the Bully/Victim Questionnaire (Olweus, 1996a) as a measure of bullying was examined. Although researchers have defined bullying and reactive aggression as two distinct types...
This Paper describes a hybrid system on 3D city modeling, data management and visualization component for 3D GIS infrastructure. The framework obtained high efficiency, without compromising the detai...
The estimation of forest biomass is important for practical issues and scientific purposes in forestry. The estimation of forest biomass on a large-scale level would be merely possible with the applic...
The purpose of this study was to investigate the effects of three different weight training protocols, that varied in the way training volume was measured, on acute muscular fatigue. Ten resistance-tr...
The construct and concurrent validity of the Thera-Band Perceived Exertion Scale for Resistance Exercise with elastic bands (EB) was examined. Twenty subjects performed two separate sets of 15 repetit...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...