>>>
搜索结果: 1-15 共查到知识库 Interference相关记录242条 . 查询时间(0.062 秒)
The rice black-streaked dwarf virus (RBSDV) disease causes severe rice yield losses in Asia. RNA interference (RNAi) has been widely applied to develop antiviral varieties in plants. So far, only a fe...
We thank Prof. Peng Zhou (Wuhan, China) for kindly providing materials and thank Yan Wu and Weijuan Shang for experimental assistance. This work was supported by the Strategic Priority Research Progra...
Refreshing algorithms are a critical ingredient for secure masking. They are instrumental in enabling sound composability properties for complex circuits, and their randomness requirements dominate th...
This study assessed the effects of semantic context in the form of self-produced and other-produced words on subsequent language production. Pairs of participants performed a joint picture naming task...
Speech-in-speech perception can be challenging because the processing of competing acoustic and linguistic information leads to informational masking. Here, a method is proposed to isolate the linguis...
Surface-generated structured illumination microscopies interrogate the position of fluorescently labeled objects near surfaces with nanometer resolution along the z axis. However, these techniques are...
Fluorescence interference contrast microscopy (FLIC) is a powerful method to structurally characterize fluorescent objects with nanometer-scale resolution in the z direction. Here we use FLIC to chara...
Disagreement exists about how bilingual speakers select words, in particular, whether words in another language compete, or competition is restricted to a target language, or no competition occurs. Ev...
This study attempted to present conditions that were closer to the real-world setting of team sports. The primary purpose was to examine the effects of blocked, random and game-based training practice...
Many applications of block designs exhibit neighbor and edge ef-fects. A popular remedy is to use the circular design coupled with the interference model. The search for optimal or efficient designs h...
The interference model has been widely used and studied in block experiments where the treatment for a particular plot has effects on its neighbor plots. In this paper, we study optimal circular desig...
In wireless sensor networks, knowing real signal interferences (received signal strength or RSS) from other sensors to cared sensor is critically important for protocol design and for many application...
Many applications of block designs exhibit neighbor and edge ef-fects. A popular remedy is to use the circular design coupled with the interference model. The search for optimal or efficient designs h...
The interference model has been widely used and studied in block experiments where the treatment for a particular plot has effects on its neighbor plots. In this paper, we study optimal circular desig...
Cache-based attacks are a class of side-channel attacks that are particularly effective in virtualized or cloud-based environments, where they have been used to recover secret keys from cryptographic...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...