>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到tutorial相关记录26条 . 查询时间(0.126 秒)
近日,华南理工大学微电子学院郑倍雄副教授与其他学者合作撰写的论文《Intelligent Reflecting Surface-Aided Wireless Communications: A Tutorial》荣获2023年度IEEE通信学会最佳教程论文奖(IEEE Communications Society Best Tutorial Paper Award)。颁奖典礼将于2023年5月在意...
中国科学院功能纳米结构设计与组装/福建省纳米材料重点实验室温珍海研究团队近年来在水系电化学能源体系开展了系列创新性地探索研究,通过设计具有pH敏感效应的阴、阳极反应,构建具有“混合碱/酸电解液”的电化学体系,将酸碱中和反应的热能以电能(电化学中和能)的形式进行收集,能够突破传统水系电化学能源体系的性能瓶颈:一方面可以优化阴、阳极电化学反应的pH环境,另一方面可以拓宽水系电池的工作窗口(>1.23 ...
This tutorial demonstrates how cryptographic security notions, constructions, and game-based security proofs can be formalized using the CryptHOL framework. As a running example, we formalize a varian...
近期,中国科学院上海硅酸盐研究所施剑林研究员和陈雨研究员带领的研究团队在国际权威综述学术期刊Chemical Society Reviews(影响因子:38.618)发表综述论文(“Nanoparticle-Triggered In-Situ Catalytic Chemical Reactions for Tumour-Specific Therapy” (Chem. Soc. Rev., 20...
The main goal of this tutorial is to show how state-of-the-art formalisms in planning and scheduling (P&S) are used to model robotics domains; some of the challenges and solutions involved in dispatch...
Oscillatory neuronal activity may provide a mechanism for dynamic network coordination. Rhythmic neuronal interactions can be quantified using multiple metrics, each with their own advantages and disa...
One of the most fundamental notions of cryptography is that of \emph{simulation}. It stands behind the concepts of semantic security, zero knowledge, and security for multiparty computation. However, ...
A geometric program (GP) is a type of mathematical optimization problem characterized by objective and constraint functions that have a special form. Recently developed solution methods can solve even...
E-Learning materials and courses are becoming increasingly established at German universities. One reason for this is that technical prerequisites for successful e-learning – such as private internet ...
This article seeks to establish a rapprochement between explicitly Bayesian models of contextual effects in perception and neural network models of such effects, particularly the connectionist interac...
Although initially introduced and studied in the late 1960s and early 1970s, statistical methods ofMarkov source or hidden Markov modeling have become increasingly popular in the last several years. T...
he emerging field of compressed sensing has potentially powerful implications for the design of optical imaging devices. In particular, compressed sensing theory suggests that one can recover a scene ...
White-box cryptography concerns the design and analysis of implementations of cryptographic algorithms engineered to execute on untrusted platforms. Such implementations are said to operate in a \emph...
This paper aims to highlight the perception of graduate and undergraduate students regarding accounting fundamentals across British system and American system. The design of this paper is to derive a ...
A new computational technique based on the symbolic description utilizing kneading invariants is proposed and verified for explorations of dynamical and parametric chaos in a few exemplary systems wit...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...