intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Data block

Xem 1-20 trên 35 kết quả Data block
  • The article discloses methodological approaches to quantifying the level of penetration of block chain technologies into the regional socioeconomic environment in comparison to the supply chain strategies. Based on the methods of mathematical and statistical analysis, it allows you to formalize and convert a large array of data of a qualitative order into a single scale for measuring the process under study - the level of demand in the regional socio-economic environment for block chain technology.

    pdf6p longtimenosee09 08-04-2024 1 1   Download

  • Bài giảng An toàn thông tin: Chương 4 Hệ mật mã khóa đối xứng hiện đại, cung cấp cho người học những kiến thức như: Hệ mật mã hiện đại; Mật mã dòng (Stream Cipher); Mật mã khối (Block Cipher); Hệ mật mã Feistel; Data Encryption Standard (DES); Chuẩn mật mã EAS. Mời các bạn cùng tham khảo!

    pdf24p trangxanh0906 12-01-2023 24 8   Download

  • Lecture "On safety and security of information systems: Symmetric ciphers" provide students with knowledge about: Block cipher principles; Data encryption standard; Feistel cipher;... Please refer to the detailed content of the lecture!

    pdf41p hoabingan205 12-12-2022 12 5   Download

  • The tectonic evolutionary history between the Xing’an Block (XB) and Songnen Block (SB) in the eastern Central Asia Orogenic Belt (CAOB) has been hotly debated. In this study, we present a series of new data to provide a better constraint on the magmatic process during plate subduction and its implications for the regional tectonic evolution of XB and SB, even the CAOB. The whole-rock geochemistry and zircon U-Pb chronology of syenogranite in the Chaihe area of the Great Xing’an Range have been carried out.

    pdf27p tanmocphong 29-01-2022 14 3   Download

  • The middle-upper Eocene Kırkgeçit Formation, the fossil content of which is the subject of this study, is deposited in a back-arc basin controlled by block-faulting. The Kırkgeçit basin is interpreted as being formed under an extensional regime related to convergence between the Anatolian plate in the north and the Arabian plate in the south.

    pdf21p tanmocphong 29-01-2022 12 1   Download

  • Transtensional faults are well developed in the S Block of the South Asia area, which have an important impact on the hydrocarbon accumulation. However, the transtensional fault structure is very complex. Based on drilling and seismic data interpretation results, faults are divided into three typical types in the Lower Cretaceous, which can help to understand the complex fault system. The main faults are distributed in the NNW-SSE direction and parallel arrangement with dextral strike-slip shear characteristics, which determines the development of the tectonic belt.

    pdf17p tanmocphong 29-01-2022 7 1   Download

  • The morphotectonic features of the TGFZ and the distribution of the epicenters of earthquakes over magnitude 5.0 show that this fault zone remains active today. In this study, the deformation of the TGFZ is determined with high sensitivity using geodetic measurements. To obtain accurate information about the deformation of the TGFZ, 24 GNSS sites and two continuously operating reference stations were constructed in the southern part of the TGFZ. Between 2018 and 2020, Global Navigation Satellite Systems (GNSS) measurements were made on this network.

    pdf14p tanmocphong 29-01-2022 22 1   Download

  • Bài giảng An toàn hệ thống thông tin: Chương 2a Mã hóa đối xứng cung cấp cho người học những kiến thức như: Mã cổ điển (Classical Encryption); Mã dòng (Stream Ciphers) và Mã khối (Block Ciphers); Mã DES (Data Encryption Standard); Mã hiện đại AES (Advanced Encryption Standard); Các mô hình ứng dụng mã khối. Mời các bạn cùng tham khảo!

    pdf34p caphesuadathemchanh 25-10-2021 63 3   Download

  • The objective of the thesis: To find decision laws on the data block and block’s slice. To find decision laws bettwen object groups on the block which has index attribute value change, particulary when smoothing, or roughing attribute value. To find decision laws bettwen object groups on the block when adding or removing block’s elements.

    pdf26p extraenglish 24-05-2021 12 3   Download

  • The objective of the thesis focus on solving three problems: To find decision laws on the data block and block’s slice; to find decision laws bettwen object groups on the block which has index attribute value change, particulary when smoothing, or roughing attribute value; to find decision laws bettwen object groups on the block when adding or removing block’s elements.

    pdf26p capheviahe27 23-02-2021 10 5   Download

  • In this study, the method based on the proposed deep-learning method called ODC-Cloud, which was built on convolutional blocks and integrating with the Open Data Cube (ODC) platform. The results showed that our proposed model achieved an overall 90% accuracy in detecting cloud in Landsat 8 OLI imagery and successfully integrated with the ODC to perform multi-scale and multi-temporal analysis.

    pdf9p larachdumlanat129 14-01-2021 19 3   Download

  • Bài giảng "Mật mã học: Mã hóa DES" cung cấp cho người học các kiến thức: Data encryption standard (DES) and alternatives, modern block ciphers, DES block cipher, descryption of DES,... Mời các bạn cùng tham khảo nội dung chi tiết.

    pdf31p abcxyz123_10 07-06-2020 38 6   Download

  • Với sự bùng nổ của Mạng trung tâm dữ liệu (Data center network), làm cho các hoạt động kinh doanh, sản xuất cũng như các dịch vụ đa phương tiện, các ứng dụng mạng ngày càng phụ thuộc vào nó. Điều này đòi hỏi các nhà cung cấp hạ tầng phải đảm bảo hệ thống mạng trung tâm dữ liệu phải có độ tin cậy và sẵn sàng cao để duy trì tính liên tục cho hệ thống. Tuy nhiên việc đánh giá độ tin cậy và tính sẵn sàng cho hệ thống chỉ mới dừng ở mức đầu tư trang thiết bị và xây dựng hệ thống dự phòng nóng.

    pdf6p sabiendo 06-02-2020 65 4   Download

  • This paper presents an image data hiding algorithm composing two models of frequency and image spaces. In comparison of well-known algorithms this algorithm can support high capacity for each image block, robustness and cryptographic security. By dicrete cosine transfer DCT, we transfer from image spaces to frequency space, using EO. algorithm to take middle frequency space, make 0, 1 matrix to hidding data, using Cheng-pan- Tseng algorithm to hidding , using invert dicrete cosine transfer rDCT to transfer image space, so the image has hidding data.

    pdf8p binhminhmuatrenngondoithonggio 09-06-2017 32 2   Download

  • By the end of grade four, students understand large numbers and addition, subtraction, multiplication, and division of whole numbers. They describe and compare simple fractions and decimals. They understand the properties of, and the relationships between, plane geometric figures. They collect, represent, and analyze data to answer questions.

    pdf21p kienkim1980 19-11-2015 44 3   Download

  • Another class of linear codes, known as Convolutional codes. We study the structure of the encoder. We study different ways for representing the encoder.Convolutional codes offer an approach to error control coding substantially different from that of block codes. A convolutional encoder: encodes the entire data stream, into a single codeword. does not need to segment the data stream into blocks of fixed size (Convolutional codes are often forced to block structure by periodic truncation). is a machine with memory.

    ppt20p doanhung_dtvtk10 24-03-2013 50 5   Download

  • HIV-1 efficiently infects susceptible cells and causes AIDS in humans. Although HIV can also enter the cells of Old World monkeys, it encoun-ters a block before reverse transcription. Data have shown that this species-specific restriction is mediated by tripartite motif (TRIM)5a, whose molecular function is still undefined.

    pdf16p media19 06-03-2013 51 4   Download

  • CPU requests contents of memory location Check cache for this data If present, get from cache (fast) If not present, read required block from main memory to cache Then deliver from cache to CPU Cache includes tags to identify which block of main memory is in each cache slot

    ppt55p tet0202 19-02-2013 111 12   Download

  • After completing this lesson, you should be able to do the following: Use automatic segment space management Use manual segment space management Manage extents and Oracle blocks Ensure effective use of space Determine the high-water mark Describe the use of Oracle block parameters Recover space from sparsely populated segments Describe and detect chaining and migration of Oracle blocks Perform index reorganization

    ppt36p trinh02 28-01-2013 64 3   Download

  • Statistics collected and the method of collection: Logical reads: Sampled Buffer busy waits: Continuous Db block changes : Sampled Physical reads: Continuous Physical writes: Continuous Physical reads direct: Continuous Physical writes direct: Continuous Global cache cr blocks served: Continuous Global cache current blocks served: Continuous ITL waits: Continuous Row lock waits: Continuous

    ppt30p trinh02 28-01-2013 60 4   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2